joelparkerhenderson / sha256-sentenceLinks
SHA256 sentence: discover a SHA256 checksum that matches a sentence's description of hex digit words.
☆21Updated 3 months ago
Alternatives and similar repositories for sha256-sentence
Users that are interested in sha256-sentence are comparing it to the libraries listed below
Sorting:
- ☆128Updated 2 years ago
- Simple demo illustrating remanence of data in RAM (see Cold boot attack) using a Raspberry Pi. Loads many images of the Mona Lisa into R…☆103Updated last year
- Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange☆17Updated 3 months ago
- ☆70Updated 2 years ago
- LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped Systems (ACSAC 2021)☆67Updated 3 years ago
- abuse ImageMagick (or GraphicsMagick) to create arbitrary files☆53Updated 3 months ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆27Updated last month
- ☆95Updated last year
- Embed a ZIP or JAR file within a PNG image to create a tweetable and "executable" PNG-ZIP/JAR polyglot.☆34Updated last week
- Zero-trust SSH CA☆29Updated 10 months ago
- Playing NES ROMs with Ghidra's PCode Emulator☆102Updated last year
- Utility to find hidden Linux kernel modules☆144Updated 6 months ago
- A tool to help you understand TPM commands and responses.☆45Updated 7 months ago
- Binary Golf Grand Prix☆112Updated last year
- CLI tool, Ghidra plug-in, and Haskell library for analyzing binaries using under-constrained symbolic execution☆119Updated this week
- create local malicious git repo☆51Updated 3 months ago
- Research and proof of concept to develop the next SecureDrop with end to end encryption.☆48Updated last month
- this URL is also malicious(?!) shell script☆143Updated 3 months ago
- GIF displaying its own MD5 (hashquine)☆77Updated 5 years ago
- An SSH metadata analyser used to showcase a timing-based attack on the protocol.☆28Updated last year
- Some files with nasty names☆46Updated 7 years ago
- Minimal setup to trigger the xz backdoor☆28Updated 8 months ago
- Steganography tool☆52Updated 4 years ago
- A very high-speed, configurable, and portable packet-crafting utility optimized for embedded devices☆78Updated 6 months ago
- ☆46Updated last month
- Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1☆58Updated last year
- Nyxelf is a highly effective tool tailored for analyzing malicious Linux ELF binaries, offering comprehensive support for both static and…☆107Updated 5 months ago
- F-Droid Fake Signer PoC☆126Updated 5 months ago
- History of commits related to the xz backdoor Discovered On March 29, 2024: CVE-2024-3094.☆10Updated last year
- A cache hard password hash/KDF☆47Updated last year