defuse / cuda-md5Links
Old NVIDIA CUDA implementation of salted MD5 brute-force
☆17Updated 9 years ago
Alternatives and similar repositories for cuda-md5
Users that are interested in cuda-md5 are comparing it to the libraries listed below
Sorting:
- Simulates Attacks of AB16 on Argon2i☆11Updated 8 years ago
- Project for the Crypto subject at Uni☆18Updated 8 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆49Updated 6 months ago
- Tools for attacking cryptographic implementations.☆21Updated 8 years ago
- 1st phase of mifare classic nested auth key recovery☆23Updated 7 years ago
- Practice and learning in the world of C RE and exploit analysis☆32Updated 7 years ago
- Ida Pro Ultimate Qt Build Guide☆26Updated 6 years ago
- A PoC demonstrating techniques exploiting CVE-2016-5696 Off-Path TCP Exploits: Global Rate Limit Considered Dangerous☆40Updated 8 years ago
- Simple shellcode decoder using unicorn-engine☆98Updated 9 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆74Updated 8 years ago
- Kudelski Security's 2017 crypto challenge☆20Updated 7 years ago
- Hacking Games in a Hacked Game☆29Updated 10 years ago
- A better SSL cipher checker using gnutls☆28Updated 8 years ago
- ☆17Updated 10 years ago
- ☆2Updated last year
- Block-based software vulnerability fuzzing framework☆49Updated 6 years ago
- finals-2014☆21Updated 8 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- ☆15Updated 7 years ago
- An x86 linux syscall table reference tool. Handy for when writing shellcode and exploits.☆35Updated 10 years ago
- Memory awesomeness.☆29Updated 10 years ago
- CTF Writeups☆23Updated 7 years ago
- ☆49Updated 7 years ago
- Public resources NB shares☆18Updated 9 years ago
- CVE-2017-5005 for Quick Heal Antivirus☆15Updated 8 years ago
- ☆13Updated 7 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Assignments for the cryptography engineering course☆12Updated 11 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆36Updated 9 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago