joelparkerhenderson / sha256-sentenceLinks
SHA256 sentence: discover a SHA256 checksum that matches a sentence's description of hex digit words.
☆21Updated 5 months ago
Alternatives and similar repositories for sha256-sentence
Users that are interested in sha256-sentence are comparing it to the libraries listed below
Sorting:
- Simple demo illustrating remanence of data in RAM (see Cold boot attack) using a Raspberry Pi. Loads many images of the Mona Lisa into R…☆103Updated last year
- An animated visualization of elliptic curve cryptography☆147Updated 2 months ago
- ☆128Updated 2 years ago
- create local malicious git repo☆51Updated 6 months ago
- Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange☆17Updated 6 months ago
- Nyxelf is a highly effective tool tailored for analyzing malicious Linux ELF binaries, offering comprehensive support for both static and…☆108Updated 8 months ago
- Research and proof of concept to develop the next SecureDrop with end to end encryption.☆49Updated last week
- IPv4 address turf war!☆71Updated 2 years ago
- Playing NES ROMs with Ghidra's PCode Emulator☆102Updated 2 years ago
- Battery info program for x86-64 Linux laptops in 384 bytes of machine code☆60Updated last year
- PUREE: Password-based Uniform-Random-Equivalent Encryption☆64Updated 5 years ago
- Blessed sanctum, save us || Sanctum is a small, reviewable, capable, pq-secure and fully privilege seperated VPN daemon. || This is a rea…☆78Updated last week
- A very high-speed, configurable, and portable packet-crafting utility optimized for embedded devices☆79Updated 8 months ago
- A distributed hash table with unusually strong security properties☆64Updated 5 years ago
- A cache hard password hash/KDF☆48Updated last year
- Slapped-together tools to reprogram the BIOS on a bricked HP Envy laptop.☆24Updated 3 years ago
- Block Erasure Format - An extensible, fast, and usable file utility to encode and decode interleaved erasure coded streams of data.☆58Updated last year
- Visualize binary files☆133Updated 3 weeks ago
- the BLAKE3 hash function implemented in 6502 assembly☆57Updated 3 years ago
- Fast and standards compliant DNS zone parser☆131Updated last month
- Community Cryptography Test Vectors☆84Updated 5 months ago
- ☆70Updated 2 years ago
- abuse ImageMagick (or GraphicsMagick) to create arbitrary files☆53Updated 6 months ago
- Some files with nasty names☆46Updated 7 years ago
- Detecting Inconsistencies in Feature or Function Evaluations of Requirements☆67Updated last year
- A Course in Cryptanalysis☆146Updated 11 months ago
- Compiling C to FlipJump☆92Updated 8 months ago
- this URL is also malicious(?!) shell script☆143Updated 6 months ago
- Privacy Pass implementation in Rust☆46Updated 3 months ago
- A tweakable block cipher☆31Updated last year