joelparkerhenderson / sha256-sentence
SHA256 sentence: discover a SHA256 checksum that matches a sentence's description of hex digit words.
☆21Updated this week
Alternatives and similar repositories for sha256-sentence:
Users that are interested in sha256-sentence are comparing it to the libraries listed below
- Simple demo illustrating remanence of data in RAM (see Cold boot attack) using a Raspberry Pi. Loads many images of the Mona Lisa into R…☆102Updated last year
- History of commits related to the xz backdoor Discovered On March 29, 2024: CVE-2024-3094.☆9Updated last year
- Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange☆16Updated 3 weeks ago
- Research and proof of concept to develop the next SecureDrop with end to end encryption.☆49Updated 2 months ago
- An animated visualization of elliptic curve cryptography☆139Updated 7 months ago
- An SSH metadata analyser used to showcase a timing-based attack on the protocol.☆27Updated 9 months ago
- ☆22Updated 9 months ago
- create local malicious git repo☆50Updated 2 weeks ago
- Differential fuzzing for elliptic curves☆23Updated last year
- AES Galois Extended Mode☆13Updated last year
- Make AES-GCM safe to use with random nonces, for any practical number of messages.☆18Updated last year
- Zero-trust SSH CA☆29Updated 7 months ago
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆13Updated 2 years ago
- ☆18Updated 10 months ago
- A cache hard password hash/KDF☆47Updated last year
- Hello, World! written in seemingly "gibberish" x86 assembly using obfuscation on the assembly and machine code -level☆43Updated last year
- A quick benchmark of {Open,Libre,Boring}SSL☆25Updated 2 years ago
- Modern re-implementation of Veles visualization☆49Updated 8 months ago
- Bertie TLS 1.3 Implementation☆118Updated this week
- A tool to help you understand TPM commands and responses.☆42Updated 4 months ago
- List of crackpot 'scientists' and 'thinkers'☆16Updated 7 months ago
- An Elliptic-Curve Based Secure Chat, written using Rust and Protobuf!☆52Updated 6 months ago
- Minimal setup to trigger the xz backdoor☆26Updated 6 months ago
- CLI tool and Ghidra plug-in for analyzing binaries using under-constrained symbolic execution☆104Updated this week
- abuse ImageMagick (or GraphicsMagick) to create arbitrary files☆53Updated 2 weeks ago
- Slapped-together tools to reprogram the BIOS on a bricked HP Envy laptop.☆24Updated 3 years ago
- PUREE: Password-based Uniform-Random-Equivalent Encryption☆63Updated 4 years ago
- Playing NES ROMs with Ghidra's PCode Emulator☆103Updated last year
- A portable assembler for Z80, 8080, Gameboy, 6805, 8051 and others.☆27Updated this week
- Privacy Pass implementation in Rust☆30Updated 4 months ago