joelparkerhenderson / sha256-sentenceLinks
SHA256 sentence: discover a SHA256 checksum that matches a sentence's description of hex digit words.
☆21Updated 7 months ago
Alternatives and similar repositories for sha256-sentence
Users that are interested in sha256-sentence are comparing it to the libraries listed below
Sorting:
- Simple demo illustrating remanence of data in RAM (see Cold boot attack) using a Raspberry Pi. Loads many images of the Mona Lisa into R…☆103Updated last year
- ☆129Updated 3 years ago
- Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange☆18Updated 7 months ago
- An animated visualization of elliptic curve cryptography☆149Updated 3 months ago
- Playing NES ROMs with Ghidra's PCode Emulator☆102Updated 2 years ago
- create local malicious git repo☆51Updated 7 months ago
- Research and proof of concept to develop the next SecureDrop with end to end encryption.☆49Updated 3 weeks ago
- Nyxelf is a highly effective tool tailored for analyzing malicious Linux ELF binaries, offering comprehensive support for both static and…☆121Updated 3 weeks ago
- Blessed sanctum, save us || Sanctum is a small, reviewable, capable, pq-secure and fully privilege seperated VPN daemon. || This is a rea…☆82Updated this week
- this URL is also malicious(?!) shell script☆144Updated 7 months ago
- abuse ImageMagick (or GraphicsMagick) to create arbitrary files☆54Updated last month
- CLI tool, Ghidra plug-in, and Haskell library for analyzing binaries using under-constrained symbolic execution☆123Updated this week
- data-at-rest updatable threshold encryption KMS server and client☆21Updated 3 weeks ago
- A Course in Cryptanalysis☆147Updated last year
- PUREE: Password-based Uniform-Random-Equivalent Encryption☆64Updated 5 years ago
- A very high-speed, configurable, and portable packet-crafting utility optimized for embedded devices☆79Updated 10 months ago
- Zero-trust SSH CA☆29Updated 2 months ago
- ☆93Updated last year
- IPv4 address turf war!☆71Updated 2 years ago
- A distributed hash table with unusually strong security properties☆64Updated 5 years ago
- ☆70Updated 2 years ago
- Slapped-together tools to reprogram the BIOS on a bricked HP Envy laptop.☆25Updated 3 years ago
- A cache hard password hash/KDF☆48Updated last year
- A suite of testvectors for X.509 certificate path validation and tools for building them☆54Updated this week
- Jupyter notebook for explaining elliptic curve encryption☆88Updated 4 years ago
- Paused mirror. Official repository at https://git.glasklar.is/system-transparency/core/stboot☆116Updated last year
- problem sets for CS-GY 6903 Applied Cryptography☆41Updated 3 years ago
- OnionShare; no Flask, just redbean.☆42Updated 2 years ago
- a set of simple steps to get from "I don't know WTF BBQ" to "I am service provider"☆53Updated last year
- Battery info program for x86-64 Linux laptops in 384 bytes of machine code☆60Updated last year