Interactive proof-of-concept of the Dual_EC_DRBG backdoor
☆20Sep 8, 2022Updated 3 years ago
Alternatives and similar repositories for dual-ec-drbg
Users that are interested in dual-ec-drbg are comparing it to the libraries listed below
Sorting:
- ☆26Nov 21, 2011Updated 14 years ago
- Source repository for the "TexTime" project :☆10Jul 5, 2025Updated 8 months ago
- Cuda Miner for BeamHash (Equihash 150,5)☆13Jan 16, 2019Updated 7 years ago
- avarehelper☆12Aug 15, 2021Updated 4 years ago
- nodemon but in golang !☆10Dec 21, 2024Updated last year
- Implementation of ChaCha20 for Cyclone V FPGA (DE10-nano) easily connectable to HPS (ARM processor)☆11Jul 29, 2020Updated 5 years ago
- Verilog bit slicing for python☆10May 13, 2021Updated 4 years ago
- Anrodi Trojanı Başka Bir Programla Birleştir☆10Oct 30, 2016Updated 9 years ago
- Chequea si tu firewall es vulnerable a CVE-2024-21762 (RCE sin autenticación)☆15Jun 29, 2025Updated 8 months ago
- The 9esim mini tool is a external (or we called extension) LPA on a board, which based on ESP32S3.☆13Dec 19, 2024Updated last year
- 🍭 A single-header C library for printing colored text to the console☆11Aug 6, 2024Updated last year
- Bitcoin Hardware Wallet Interaction scripts☆11Jan 30, 2026Updated last month
- The old version of RPNow☆10Feb 15, 2018Updated 8 years ago
- Repository of now harmless TREZOR security exploits☆11Jun 14, 2015Updated 10 years ago
- A quantum enhanced, totaly private encryption app that uses true random key generation from zero point energy.☆13Jul 2, 2025Updated 8 months ago
- Frequently asked questions about augmentation, biohacking, grinding, implants, and related topics.☆10Nov 26, 2024Updated last year
- A balatro mod using steamodded revolving around a celeste card theme☆16Aug 17, 2025Updated 6 months ago
- ☆42Jun 27, 2022Updated 3 years ago
- A Practical Ring Learning With Errors (RingLWE) Implementation containing New Hope and Peikert reconciliation for Prime and Power-of-2 ca…☆36May 30, 2018Updated 7 years ago
- PoWx mission: Aiming at smaller energy per hash hardware.☆11Dec 18, 2021Updated 4 years ago
- An open source badge☆10Oct 8, 2025Updated 5 months ago
- Rust + Tor (embedded) + Static (compile) + Windows + Proof of Concept☆13Feb 4, 2018Updated 8 years ago
- implementation of OEIS sequences☆11Nov 30, 2016Updated 9 years ago
- A SETI / technosignature search code to find intelligent life beyond Earth☆13Dec 15, 2025Updated 2 months ago
- ☆10Mar 26, 2022Updated 3 years ago
- ☆12Feb 24, 2023Updated 3 years ago
- An old NAT-PMP/UPnP proxy implementation☆10Jan 28, 2012Updated 14 years ago
- Firmware images for hacking, reverse engineering, and teardown of the Ryze / DJI / Intel Movidius Tello☆10Dec 6, 2018Updated 7 years ago
- ☆12Dec 31, 2022Updated 3 years ago
- Python port of UMSKT☆12May 5, 2024Updated last year
- This is a collection of known malware and threats found on various Linux/web servers. Also find known ways to detect☆12Aug 1, 2020Updated 5 years ago
- KeePass v1 DB tool☆29Apr 6, 2013Updated 12 years ago
- ☆12Aug 17, 2020Updated 5 years ago
- 👾 monitor web server's log files against CSRF attacks (a modification of apache's mod_security to log these attacks)☆14Oct 15, 2024Updated last year
- Cross-Domain DPA Attack on SAML11☆17Jul 14, 2019Updated 6 years ago
- A multi-interface (REST and MCP) server for automatic license plate recognition 🚗☆21Dec 2, 2025Updated 3 months ago
- A centralized Python botnet that currently supports HTTP, TCP and UDP flood attacks.☆14Jul 6, 2025Updated 8 months ago
- Collection of bash scripts to report on health of block devices and file systems☆16Aug 1, 2020Updated 5 years ago
- work in progress port of n64decomp/perfect_dark to modern platforms☆12Jan 21, 2026Updated last month