itsuki-hayashi / zucView external linksLinks
Implementation for ZUC stream cipher
☆16Jun 2, 2016Updated 9 years ago
Alternatives and similar repositories for zuc
Users that are interested in zuc are comparing it to the libraries listed below
Sorting:
- ☆12Mar 17, 2014Updated 11 years ago
- Example of CRUSH compression with optimal parsing using BriefLZ algorithms☆15Nov 1, 2023Updated 2 years ago
- A test library for computing modular exponentiation in parallel using AVX-512 vector arithmetic☆12Dec 18, 2023Updated 2 years ago
- Experimental DUML client written in java. Licensed under GPLv3☆14Jan 7, 2018Updated 8 years ago
- ☆10Apr 5, 2019Updated 6 years ago
- CS外挂☆12Mar 25, 2019Updated 6 years ago
- ☆11Nov 25, 2020Updated 5 years ago
- Сlone of POLE - portable library for structured storage.☆11Apr 25, 2018Updated 7 years ago
- Fast compressor/decompressor for 68000 based on ZX7 by Einar Saukas☆12Jul 28, 2018Updated 7 years ago
- Software Modules and Examples for the PiFex☆14Aug 23, 2025Updated 5 months ago
- Intel-Process communitation☆10Feb 27, 2017Updated 8 years ago
- 这里存放的是我们团队做CTF题目的时候经常用到的一些工具☆11Nov 5, 2018Updated 7 years ago
- A transpiler which compiles c-like syntax to pure C. This supports classes, let declaration, for-in loops. Created using Flex and Bison.☆10Jun 25, 2020Updated 5 years ago
- Parsing, modifying and using DUML packets☆14Nov 24, 2025Updated 2 months ago
- Example usage of Dyninst☆14Nov 26, 2025Updated 2 months ago
- A custom SentinelOne USB scanner.☆18Mar 26, 2022Updated 3 years ago
- World Fastest MD5 cracker☆13Feb 10, 2020Updated 6 years ago
- Qt project that mimics mind mapping(qt模仿的思维导图项目)☆13Feb 25, 2022Updated 3 years ago
- Linux Programming Interface Kerrisk☆12Jan 11, 2019Updated 7 years ago
- Implementation trade-offs in using Intel Pin for instruction tracing of complex programs☆15Oct 16, 2019Updated 6 years ago
- Source code for the experimental, compact "wee" file compression utility.☆13May 8, 2020Updated 5 years ago
- A critical RCE vulnerability in Windows TCP/IP stack (CVE-2025-26686) leaves sensitive memory unlocked, allowing remote attackers to hija…☆32Sep 16, 2025Updated 5 months ago
- ☆13Nov 4, 2014Updated 11 years ago
- A simple implementation of the Huffman Coding in C☆10Oct 8, 2016Updated 9 years ago
- Evergrowing compilation of challenges I authored for various CTF's and my Intended solutions☆13Oct 7, 2022Updated 3 years ago
- Native Lua / LuaJIT RC4 stream cipher library☆11Jul 23, 2021Updated 4 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Jun 29, 2025Updated 7 months ago
- ☆14Jul 12, 2024Updated last year
- Compile-time Evaluable SHA3 in C++: Permutation-based Cryptographic Hashing☆13Feb 8, 2026Updated last week
- DJI Duml Packet Parser☆11Sep 23, 2018Updated 7 years ago
- CUMT教务系统模拟登录☆14Aug 1, 2019Updated 6 years ago
- CAN Bus Voltage Dataset for the SIMPLE paper☆11Oct 2, 2019Updated 6 years ago
- A driver loader tool that helps in the study of Windows kernel. || 一个驱动加载工具,在Windows内核的学习过程中可以提供帮助。☆12Jul 3, 2020Updated 5 years ago
- Create direct download links from terabox☆13Mar 22, 2023Updated 2 years ago
- Book's Example Code☆10Aug 31, 2015Updated 10 years ago
- 一纸黑字~~☆10Nov 5, 2021Updated 4 years ago
- MD5 calculation (VisualBasic script for calculating the md5 checksum of a string)☆16Nov 24, 2015Updated 10 years ago
- A pure Go implementation of the Windows Packet Filter NDISAPI library☆23Aug 20, 2025Updated 5 months ago
- a bunch of malware in all platform, some maybe not work, this code for some study case or for knowledge. for information about malware yo…☆14Jan 29, 2021Updated 5 years ago