joelparkerhenderson / sha256-sentenceLinks
SHA256 sentence: discover a SHA256 checksum that matches a sentence's description of hex digit words.
☆21Updated last month
Alternatives and similar repositories for sha256-sentence
Users that are interested in sha256-sentence are comparing it to the libraries listed below
Sorting:
- Simple demo illustrating remanence of data in RAM (see Cold boot attack) using a Raspberry Pi. Loads many images of the Mona Lisa into R…☆103Updated last year
- Research and proof of concept to develop the next SecureDrop with end to end encryption.☆48Updated last week
- abuse ImageMagick (or GraphicsMagick) to create arbitrary files☆53Updated 2 months ago
- Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange☆16Updated 2 months ago
- ☆27Updated 3 years ago
- An SSH metadata analyser used to showcase a timing-based attack on the protocol.☆27Updated 11 months ago
- A quick benchmark of {Open,Libre,Boring}SSL☆25Updated 2 years ago
- create local malicious git repo☆50Updated 2 months ago
- IPv4 address turf war!☆70Updated last year
- Battery info program for x86-64 Linux laptops in 384 bytes of machine code☆59Updated last year
- My experiments in understanding AES, Whitebox AES, and related attacks☆16Updated 4 years ago
- Detecting Inconsistencies in Feature or Function Evaluations of Requirements☆67Updated last year
- torrent -> http plumbing☆24Updated 4 years ago
- Jupyter notebook for explaining elliptic curve encryption☆88Updated 4 years ago
- Block Erasure Format - An extensible, fast, and usable file utility to encode and decode interleaved erasure coded streams of data.☆58Updated last year
- Playing NES ROMs with Ghidra's PCode Emulator☆103Updated last year
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated last year
- History of commits related to the xz backdoor Discovered On March 29, 2024: CVE-2024-3094.☆10Updated last year
- this URL is also malicious(?!) shell script☆143Updated 2 months ago
- A distributed hash table with unusually strong security properties☆64Updated 5 years ago
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆13Updated 2 years ago
- An animated visualization of elliptic curve cryptography☆140Updated 8 months ago
- Fastgcd is a C implementation of an efficient algorithm to compute the pairwise GCDs of a collection of integers. The algorithm is due to…☆17Updated last year
- Binary Golf Grand Prix☆111Updated last year
- A cache hard password hash/KDF☆47Updated last year
- Steganography tool☆52Updated 4 years ago
- Blessed sanctum, save us || Sanctum is a small, reviewable, capable, pq-safe and fully privilege seperated VPN daemon. || This is a read-…☆72Updated this week
- Code used in blog posts☆34Updated 3 weeks ago
- A dead man's switch for full but responsible disclosure of vulnerabilities☆55Updated 7 months ago
- TLS-Anvil, a fully automated TLS testsuite for client and servers.☆92Updated this week