Implementation of Strumok stream cipher
☆19Aug 20, 2022Updated 3 years ago
Alternatives and similar repositories for dstu8845
Users that are interested in dstu8845 are comparing it to the libraries listed below
Sorting:
- Бібліотека криптографічних перетворень☆53Feb 7, 2025Updated last year
- Reference implementation of the Kalyna block cipher (DSTU 7624:2014), all block and key length variants☆36Mar 3, 2021Updated 5 years ago
- Reference implementation of the Kupyna hash function (DSTU 7564:2014)☆20Aug 3, 2015Updated 10 years ago
- ☆11Jun 2, 2015Updated 10 years ago
- DSTU 4145 cryptography implementation in Python☆14Sep 4, 2016Updated 9 years ago
- Examples for the HEBI Robotics Python API☆14Jan 9, 2026Updated last month
- ☆12Feb 4, 2025Updated last year
- ☆10Sep 10, 2025Updated 5 months ago
- ☆11Oct 8, 2023Updated 2 years ago
- Converts Python3 .py files into .exe and makes it so the file can run on any environment without installing python3.☆11Jun 7, 2018Updated 7 years ago
- This is a PoC using native windows API directx, to hide and decrypt shellcode via compute shader☆10May 3, 2025Updated 10 months ago
- Python library for Alphanov's PDM laser sources control☆13Feb 24, 2026Updated last week
- Fork of libsignal-protocol-c adding support for OMEMO XEP-0384 0.5.0+☆13Mar 29, 2025Updated 11 months ago
- I2P Daemon written in Rust☆14Apr 7, 2017Updated 8 years ago
- An ESPHome component for accepting a secret PIN over Bluetooth LE.☆11Apr 7, 2024Updated last year
- ECED440 Computer Security☆11Nov 6, 2024Updated last year
- A simple DNS exfiltration script☆11Apr 17, 2023Updated 2 years ago
- A simple .NET library for handling INI files☆12May 5, 2020Updated 5 years ago
- A full-stack for indexing DEX trades on Solana using Yellowstone GRPC and Timescale.☆13Feb 4, 2025Updated last year
- Read out firmware of some STM32 parts☆13Jul 20, 2025Updated 7 months ago
- convert pcf font file to pixelated ttf font file☆13Apr 12, 2024Updated last year
- WebAssembly interpreter Wasm3 on M5Stack (work in progress)☆12Jan 4, 2023Updated 3 years ago
- Higher-order Masking of AES-128 based on the Rivain and Prouff method, CPRR method and Common Shares with Random Reduction method.☆14May 13, 2017Updated 8 years ago
- GOST-34.11-2012 (Stribog) hash-function☆11May 12, 2015Updated 10 years ago
- A PoC C2 implementation that uses Native Messaging API to execute direct commands in the OS☆17Nov 5, 2025Updated 4 months ago
- USB library for ChipWhisperer devices☆15Jan 22, 2026Updated last month
- A simple and efficient TPU (Transaction Processing Unit) client for Solana, utilizing the QUIC protocol for data transmission.☆21Dec 14, 2024Updated last year
- A python code for HART-IP Specification☆12Aug 18, 2016Updated 9 years ago
- Bypassing AV, EDR, Application Whitelisting and ASR Rules☆13Apr 18, 2023Updated 2 years ago
- ☆12Aug 17, 2020Updated 5 years ago
- Ghidra Loader for ESP32 Flash Dumps☆15Feb 10, 2025Updated last year
- Tool to extract metamask vault hash☆12Nov 3, 2024Updated last year
- AIDA64DRIVER Elevation of Privilege Vulnerability☆16Oct 25, 2024Updated last year
- ☆12Jan 6, 2022Updated 4 years ago
- Spawn SYSTEM shells like a PRO!☆10Mar 8, 2023Updated 2 years ago
- Spacemesh command-line tool☆10Nov 21, 2025Updated 3 months ago
- An automated toolkit to analyze and detect changes in secure hardware and cryptographic libraries. SCRUTINY provides high-level framework…☆16Feb 12, 2026Updated 3 weeks ago
- (dead/2006) The old ZDL.☆11Jan 21, 2011Updated 15 years ago
- ☆11Oct 28, 2020Updated 5 years ago