soatok / gcm-exploitLinks
☆16Updated last year
Alternatives and similar repositories for gcm-exploit
Users that are interested in gcm-exploit are comparing it to the libraries listed below
Sorting:
- An exploit chain for the Magic Leap One (and probably other TX2 devices)☆68Updated 4 months ago
- Minimal setup to trigger the xz backdoor☆28Updated 11 months ago
- A cache hard password hash/KDF☆48Updated last year
- post-quantum safe encryption plugin for age encryption☆22Updated 3 years ago
- IPv4 address turf war!☆71Updated 2 years ago
- Simple demo illustrating remanence of data in RAM (see Cold boot attack) using a Raspberry Pi. Loads many images of the Mona Lisa into R…☆103Updated last year
- A backward-compatible subset of the PNG file format, for uncompressed bitmaps☆24Updated last year
- A suite of testvectors for X.509 certificate path validation and tools for building them☆54Updated this week
- data-at-rest updatable threshold encryption KMS server and client☆20Updated this week
- The AEGIS-128X and AEGIS-256X high performance ciphers.☆37Updated 9 months ago
- Privacy Pass implementation in Rust☆45Updated 2 months ago
- Documentation about the xz backdoor created by #xz-backdoor-reversing☆61Updated last year
- Research and proof of concept to develop the next SecureDrop with end to end encryption.☆49Updated this week
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆13Updated 2 weeks ago
- playing with DDR DRAM bus fault injection☆92Updated 11 months ago
- F-Droid Fake Signer PoC☆127Updated 8 months ago
- Towards an IETF RFC draft for PASETO☆36Updated 3 years ago
- Specification for a Fediverse Directory Server for Public Keys☆117Updated 5 months ago
- Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange☆17Updated 6 months ago
- ☆19Updated last year
- ☆11Updated last year
- Bertie TLS 1.3 Implementation☆124Updated 3 months ago
- Compiling C to FlipJump☆92Updated 8 months ago
- I put way too much effort into controlling my LG DualUp's inputs from my laptop☆113Updated 2 years ago
- this is so dumb☆10Updated 2 years ago
- Get rickrolled, right in your favourite NSA reverse engineering tool☆77Updated 2 years ago
- A tiny, portable implementation of the IPCrypt specification in C.☆26Updated last week
- LLM tokenizer in Zig☆15Updated 3 weeks ago
- TypeScript Implementation of X3DH☆97Updated 2 years ago
- A demonstrative cryptographically secure RISC-V bootloader written in Rust for a final year project at The University of Manchester☆67Updated last year