soatok / gcm-exploitLinks
☆16Updated last year
Alternatives and similar repositories for gcm-exploit
Users that are interested in gcm-exploit are comparing it to the libraries listed below
Sorting:
- An exploit chain for the Magic Leap One (and probably other TX2 devices)☆62Updated 3 months ago
- Privacy Pass implementation in Rust☆43Updated last month
- ☆19Updated last year
- Minimal setup to trigger the xz backdoor☆28Updated 9 months ago
- Research and proof of concept to develop the next SecureDrop with end to end encryption.☆48Updated last week
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆12Updated last week
- Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange☆17Updated 4 months ago
- Simple demo illustrating remanence of data in RAM (see Cold boot attack) using a Raspberry Pi. Loads many images of the Mona Lisa into R…☆103Updated last year
- A tiny library to properly encrypt IP addresses.☆20Updated 2 months ago
- ☆14Updated 2 years ago
- tvisor is a tiny 100% userspace syscall interception framework☆44Updated last year
- Suite of symmetric cryptography primitives built on top of the ASCON permutation☆44Updated 8 months ago
- ☆104Updated 2 weeks ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆27Updated 2 months ago
- A demonstrative cryptographically secure RISC-V bootloader written in Rust for a final year project at The University of Manchester☆69Updated last year
- Playing NES ROMs with Ghidra's PCode Emulator☆102Updated last year
- A suite of testvectors for X.509 certificate path validation and tools for building them☆54Updated last week
- Bertie TLS 1.3 Implementation☆124Updated 2 months ago
- A super simple /sbin/init for Linux which allows running one and only one program☆28Updated last year
- EVE Virtual Environment - A management toolkit for libvirt-based virtualization servers.☆11Updated 5 months ago
- Tools for power measurements of post-quantum cryptographic algorithms☆28Updated 5 years ago
- Random experiments and shenanigans☆13Updated 2 months ago
- ☆89Updated 11 months ago
- Documentation about the xz backdoor created by #xz-backdoor-reversing☆61Updated last year
- A backward-compatible subset of the PNG file format, for uncompressed bitmaps☆24Updated 10 months ago
- arm decoders for the yaxpeax project☆31Updated 2 months ago
- Compiling C to FlipJump☆92Updated 6 months ago
- A cache hard password hash/KDF☆47Updated last year
- Filesystems that cause an OS panic☆13Updated 5 years ago
- ☆27Updated 2 years ago