sebastien-riou / aes-brute-forceView external linksLinks
Using Intel AES-NI and c++ threads to search an AES128 key (well, part of it)
☆83Jan 10, 2025Updated last year
Alternatives and similar repositories for aes-brute-force
Users that are interested in aes-brute-force are comparing it to the libraries listed below
Sorting:
- Belluminar 2016 Beijing stuff☆26Jun 3, 2016Updated 9 years ago
- Dll injection through code page id modification in registry. Based on jonas lykk research☆17Jun 18, 2022Updated 3 years ago
- ☆10Nov 23, 2021Updated 4 years ago
- My solutions for random crackmes and other challenges☆12Dec 23, 2019Updated 6 years ago
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆30Sep 24, 2025Updated 4 months ago
- Anything related to Ghidra☆12Apr 22, 2019Updated 6 years ago
- Attacks on Jarvis and Friday☆10Oct 9, 2019Updated 6 years ago
- ☆13Mar 3, 2021Updated 4 years ago
- AES-NI bruteforcer for bad Character Sets☆10Jan 17, 2021Updated 5 years ago
- ☆14Jan 7, 2023Updated 3 years ago
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆84Apr 13, 2022Updated 3 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- IDAPython script for quick vulnerability analysis☆32May 10, 2014Updated 11 years ago
- Yet another IDA Pro real time syncing plugin☆16Mar 27, 2018Updated 7 years ago
- Use Dispatch to add AFL-compatible instrumentation to your binaries☆12Dec 30, 2016Updated 9 years ago
- A lecture on quantum computing and symmetric-key cryptography at Chinese Academy of Sciences☆15Nov 19, 2020Updated 5 years ago
- Proof of Work generator☆12Jun 26, 2019Updated 6 years ago
- Hardware designs for fault detection☆19Apr 13, 2020Updated 5 years ago
- Simulate afl-fuzz☆16Aug 1, 2019Updated 6 years ago
- A Sage interface for FGb (Gröbner basis computations)☆39Feb 1, 2026Updated 2 weeks ago
- ☆17May 7, 2025Updated 9 months ago
- masked, bit-sliced AES-128 demo code☆14Jan 10, 2025Updated last year
- A new heuristic to optimize implementations of linear matrices☆19Jan 2, 2023Updated 3 years ago
- ☆12Oct 7, 2019Updated 6 years ago
- Slides + image for the 19. Sesja Linuksowa talk: "Can we boot Linux from just a floppy?"☆18Aug 5, 2025Updated 6 months ago
- Automated Generation of Masked Hardware☆19May 7, 2024Updated last year
- ☆20Nov 8, 2020Updated 5 years ago
- Prince cipher source code in C99 and test vectors with intermediate values☆15May 22, 2021Updated 4 years ago
- Malware.lu tools☆63Oct 28, 2013Updated 12 years ago
- Reference code for the Simeck family of block ciphers☆15Jun 21, 2015Updated 10 years ago
- Demonstrates consuming from a SecurityTrace ETW session by consuming from the Threat-Intelligence ETW provider without a driver or PPL pr…☆63Jan 19, 2026Updated 3 weeks ago
- PE (EXE) File Embed wrap, injection of DLL/ASI (based on pefrmdllembed)☆21Dec 25, 2024Updated last year
- Zydis JavaScript bindings via WASM☆21Mar 28, 2023Updated 2 years ago
- MILP-based Differential Attack on Round-Reduced GIFT☆19Dec 9, 2018Updated 7 years ago
- My CTF challenges, especially cryptography☆25Mar 4, 2025Updated 11 months ago
- Resources to break Adoring Poitras from WhibOx contest☆19Apr 13, 2020Updated 5 years ago
- ☆20Dec 13, 2019Updated 6 years ago
- NixOS-based Router☆19Aug 3, 2025Updated 6 months ago
- Attacking ECDSA with nonce leakage using lattice-based algorithms☆43Nov 19, 2025Updated 2 months ago