outspace / dstu8845Links
Implementation of Strumok stream cipher
☆17Updated 2 years ago
Alternatives and similar repositories for dstu8845
Users that are interested in dstu8845 are comparing it to the libraries listed below
Sorting:
- Reference implementation of the Kalyna block cipher (DSTU 7624:2014), all block and key length variants☆34Updated 4 years ago
- Reference implementation of the Kupyna hash function (DSTU 7564:2014)☆19Updated 9 years ago
- Бібліотека криптографічних перетворень☆49Updated 4 months ago
- HOOGMOON — Remote Access OS for Internet Censorship Research☆31Updated 5 months ago
- ☆46Updated 2 years ago
- Little library for assembly language (fasm, x86-64, linux).☆41Updated last year
- ☆9Updated 2 years ago
- ☆44Updated 5 years ago
- GOST R 34.11-2012: RFC-6986 cryptographic hash function☆74Updated last year
- Private Mode eXecution for Windows on Python☆24Updated 4 years ago
- ☆11Updated last year
- ☆29Updated 5 years ago
- Von-Neumann 16-bit relay computer with Brainfuck++ instruction set☆45Updated 5 years ago
- AntiBlock sniffer DNS requests. The IP addresses of the specified domains are added to the routing table for routing through the specifie…☆54Updated 2 months ago
- IP obfuscation NFQUEUE/kmod filter☆48Updated last month
- An official data dump of resources restricted by Russia's Roskomnadzor. Dive into the details of internet censorship in Russia! 🌐🔐☆26Updated 11 months ago
- БМПОС - Базовая Модульная Платформа Операционных Систем для платформы x86_64☆79Updated 8 months ago
- TLS client/server framework mimics OpenSSL to SSP interface☆28Updated 2 weeks ago
- This is a sample project which helps to understand how booting from CD-ROM and flash disks works.☆11Updated 2 years ago
- ☆11Updated 10 years ago
- my (re)implementation of antizapret like vpn☆17Updated 7 months ago
- [Deprecated: use userver-create-service instead!] Template of a C++ service that uses userver framework with gRPC and PostgreSQL. Build, …☆19Updated last month
- Kris Kaspersky books and articles, dokuwiki syntax☆41Updated 8 years ago
- ☆8Updated 4 years ago
- В этом репозитории находятся все примеры, рассмотренные в книге «Фундаментальные основы хакерства. Анализ программ в среде Win64»☆27Updated 2 years ago
- TereStun — STUN over Teredo☆14Updated 2 years ago
- Деобфускатор результатов выборов 2021☆34Updated 3 years ago
- GSM base stations for calling everyone around☆90Updated 3 years ago
- flylinkdc-r5xx☆57Updated 2 years ago
- ☆38Updated 4 years ago