joelparkerhenderson / sha256-sentence
SHA256 sentence: discover a SHA256 checksum that matches a sentence's description of hex digit words.
☆21Updated last month
Alternatives and similar repositories for sha256-sentence
Users that are interested in sha256-sentence are comparing it to the libraries listed below
Sorting:
- Simple demo illustrating remanence of data in RAM (see Cold boot attack) using a Raspberry Pi. Loads many images of the Mona Lisa into R…☆102Updated last year
- Research and proof of concept to develop the next SecureDrop with end to end encryption.☆48Updated 3 weeks ago
- Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange☆16Updated last month
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆13Updated 2 years ago
- Bertie TLS 1.3 Implementation☆118Updated this week
- Make AES-GCM safe to use with random nonces, for any practical number of messages.☆18Updated last year
- create local malicious git repo☆50Updated last month
- IPv4 address turf war!☆70Updated last year
- Minimal setup to trigger the xz backdoor☆27Updated 6 months ago
- abuse ImageMagick (or GraphicsMagick) to create arbitrary files☆53Updated last month
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated last year
- AES Galois Extended Mode☆14Updated last year
- ☆25Updated this week
- An animated visualization of elliptic curve cryptography☆140Updated 8 months ago
- Privacy Pass implementation in Rust☆34Updated this week
- An SSH metadata analyser used to showcase a timing-based attack on the protocol.☆27Updated 10 months ago
- AES-GEM (AES Galois Extended Mode) implementation.☆13Updated 2 months ago
- Differential fuzzing for elliptic curves☆23Updated last year
- A suite of testvectors for X.509 certificate path validation and tools for building them☆50Updated this week
- Formal Analysis of the PQXDH Protocol☆25Updated 11 months ago
- Detecting Inconsistencies in Feature or Function Evaluations of Requirements☆67Updated last year
- The AEGIS-128X and AEGIS-256X high performance ciphers.☆35Updated 4 months ago
- A simple Jupyter Notebook to graph a users commit history over time, specifically looking at the author of the xz backdoor.☆21Updated last year
- A distributed hash table with unusually strong security properties☆64Updated 5 years ago
- Source Code Transparency☆11Updated last year
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆19Updated last year
- Documentation about the xz backdoor created by #xz-backdoor-reversing☆61Updated last year
- Sanitize documents to safe PDFs, for active content removal☆37Updated last week
- List of crackpot 'scientists' and 'thinkers'☆16Updated this week
- A demonstrative cryptographically secure RISC-V bootloader written in Rust for a final year project at The University of Manchester☆65Updated 9 months ago