joelparkerhenderson / sha256-sentence
SHA256 sentence: discover a SHA256 checksum that matches a sentence's description of hex digit words.
☆21Updated last year
Alternatives and similar repositories for sha256-sentence:
Users that are interested in sha256-sentence are comparing it to the libraries listed below
- Simple demo illustrating remanence of data in RAM (see Cold boot attack) using a Raspberry Pi. Loads many images of the Mona Lisa into R…☆101Updated last year
- Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange☆16Updated 5 months ago
- Minimal setup to trigger the xz backdoor☆25Updated 3 months ago
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆12Updated 2 years ago
- History of commits related to the xz backdoor Discovered On March 29, 2024: CVE-2024-3094.☆9Updated 10 months ago
- Research and proof of concept to develop the next SecureDrop with end to end encryption.☆48Updated last week
- Bertie TLS 1.3 Implementation☆118Updated this week
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆14Updated 2 years ago
- Playing NES ROMs with Ghidra's PCode Emulator☆101Updated last year
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated last year
- A quick benchmark of {Open,Libre,Boring}SSL☆25Updated 2 years ago
- abuse ImageMagick (or GraphicsMagick) to create arbitrary files☆53Updated 3 months ago
- Code used in blog posts☆33Updated 6 months ago
- Blessed sanctum, save us || Sanctum is a small, reviewable, capable and fully privilege seperated VPN daemon. || This is a read-only mirr…☆47Updated this week
- IPv4 address turf war!☆71Updated last year
- An implementation of Dumer's algorithm for Information Set Decoding.☆13Updated last year
- Detecting Inconsistencies in Feature or Function Evaluations of Requirements☆67Updated 10 months ago
- Random experiments and shenanigans☆13Updated 3 months ago
- A suite of testvectors for X.509 certificate path validation and tools for building them☆46Updated this week
- Make AES-GCM safe to use with random nonces, for any practical number of messages.☆18Updated 10 months ago
- Crypto library☆55Updated last week
- A simple Jupyter Notebook to graph a users commit history over time, specifically looking at the author of the xz backdoor.☆21Updated 10 months ago
- Binary Golf Grand Prix☆111Updated last year
- Hello, World! written in seemingly "gibberish" x86 assembly using obfuscation on the assembly and machine code -level☆43Updated last year
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆20Updated 3 years ago
- ☆113Updated last year
- Documentation about the xz backdoor created by #xz-backdoor-reversing☆60Updated 10 months ago
- Block Erasure Format - An extensible, fast, and usable file utility to encode and decode interleaved erasure coded streams of data.☆58Updated 8 months ago
- A list of backdoor samples I find online.☆13Updated 5 years ago
- ☆128Updated 2 years ago