trailofbits / sixtyfour
How fast can we brute force a 64-bit comparison?
☆52Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for sixtyfour
- Detect patterns of bad behavior in function calls☆25Updated 4 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆74Updated 2 years ago
- A neural network using fuzzing-style feedback rather than back-propagation☆17Updated 4 years ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆14Updated 4 years ago
- A tweakable block cipher☆30Updated 6 months ago
- estimate peak virtual memory use☆19Updated 9 months ago
- Differential fuzzing for elliptic curves☆23Updated last year
- Tracks runtime instruction execution in Linux programs☆33Updated 11 years ago
- ☆35Updated 4 years ago
- An AES-based 384 bit permutation.☆18Updated 5 years ago
- Lower Size Bounds for Sorting Networks☆43Updated 3 years ago
- Tools for power measurements of post-quantum cryptographic algorithms☆26Updated 4 years ago
- DES cracking using brute force algorithm and CUDA☆23Updated 7 years ago
- A div-less, mul-less, atomic-less `rv64i` compiler toolchain using purely clang, musl, and compiler-rt☆28Updated 4 years ago
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆12Updated 2 years ago
- A simple library focusing on demangling symbols for different programing languages☆41Updated 3 years ago
- poststructural fuzzing☆31Updated 4 years ago
- cgo wrappers around post-quantum cryptography primitives☆23Updated 5 years ago
- Manipulate C-family ASTs with Clang☆64Updated 6 years ago
- Verifying constant-time code with symbolic execution☆42Updated 3 years ago
- An RFC5297-compliant C implementation of AES-SIV☆19Updated 4 years ago
- Trace a program using CPU tracer technology.☆27Updated 2 years ago
- A simple proof of work, mainly designed to mitigate DDoS attacks.☆24Updated 3 years ago
- A fairly quick data structure for matching a string against a large list of patterns.☆34Updated 6 months ago
- A Secure and Memory-Efficient Heap Allocator☆32Updated 5 months ago
- Tool for findings bugs in epoll-based Linux servers☆28Updated 4 years ago