☆12Oct 15, 2016Updated 9 years ago
Alternatives and similar repositories for hacking
Users that are interested in hacking are comparing it to the libraries listed below
Sorting:
- AVX-2 vectorised 8-bit positional popcount for Go☆23Aug 28, 2020Updated 5 years ago
- proof of concept to backdoor files from owncloud encryption module☆17Mar 26, 2016Updated 9 years ago
- Proof-of-concept implementation of the (V)OPRF protocol in https://datatracker.ietf.org/doc/draft-irtf-cfrg-voprf/☆23Aug 24, 2020Updated 5 years ago
- [RFC9380] Hash to curves - Rust reference implementation☆28Mar 10, 2024Updated last year
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Aug 5, 2024Updated last year
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Apr 24, 2025Updated 10 months ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆31Oct 26, 2023Updated 2 years ago
- UPC router default WPA2 key generator☆32Jul 11, 2016Updated 9 years ago
- A plugin for KeePass that highlights entries based on their password quality. Easily spot weak passwords and improve them.☆29Nov 30, 2021Updated 4 years ago
- ☆10Mar 4, 2024Updated last year
- Unfinished Whatsapp clone☆20Oct 3, 2013Updated 12 years ago
- Benchmarks of all public available SNARK/STARK keccak circuits☆13Oct 1, 2023Updated 2 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- DODO smart contract on EVM☆10Mar 5, 2023Updated 2 years ago
- This project is no longer maintained here, instead please see 'Untamed Now Playing Next', maintained by Wykks☆26May 9, 2014Updated 11 years ago
- MIP21 example☆15Jun 20, 2022Updated 3 years ago
- uBlock/Adblock filters for NSA list of known compromised servers☆29Jun 28, 2018Updated 7 years ago
- masterpassword for Firefox☆33Nov 5, 2024Updated last year
- Python library for vectorial Boolean functions in cryptography☆11Nov 15, 2023Updated 2 years ago
- [RFC9380] Hash to curves - Go reference implementation☆21Nov 20, 2025Updated 3 months ago
- Docker image: DNS over HTTPS proxy☆11Jun 26, 2020Updated 5 years ago
- A Powershell script for signing or adding signatures to tap-windows6 drivers☆10Apr 18, 2019Updated 6 years ago
- Convex optimization for fun and profit.☆11Jan 12, 2022Updated 4 years ago
- Tiny app to host static sites.☆12Oct 7, 2024Updated last year
- 5Degrees Protocol Core☆11May 7, 2022Updated 3 years ago
- Wrapper of the OpenSSL elliptic curve functions for easy Python manipulation☆11Apr 30, 2014Updated 11 years ago
- ☆12Sep 26, 2024Updated last year
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆10Feb 1, 2019Updated 7 years ago
- History compaction zkSNARK circuit for Plasma Cash and Cashflow history compaction☆15Mar 20, 2019Updated 6 years ago
- Elliptic curve Go reference implementation☆26Feb 5, 2025Updated last year
- Execute system calls over the network☆11Nov 17, 2014Updated 11 years ago
- Misuse cases of Cryptography in real world software products☆12Nov 4, 2018Updated 7 years ago
- The technical paper for the Spark protocol☆11Mar 5, 2024Updated last year
- Vector Commitments with Constant-Sized, Updatable Proofs and Linear-Sized Public Parameters☆11Jun 3, 2021Updated 4 years ago
- Go module for https://github.com/celo-org/bls-zexe/☆13Feb 2, 2024Updated 2 years ago
- Intel-Process communitation☆10Feb 27, 2017Updated 9 years ago
- Web app for tracking speedrunning times and personal bests.☆17Sep 18, 2021Updated 4 years ago
- Unsafe 3-round MuSig in Python for experimentation☆11Jan 12, 2023Updated 3 years ago
- Provisions: Privacy-preserving proofs of solvency for Bitcoin☆14Jan 10, 2016Updated 10 years ago