SHA-3 finalist (reference code)
☆41May 2, 2014Updated 11 years ago
Alternatives and similar repositories for BLAKE
Users that are interested in BLAKE are comparing it to the libraries listed below
Sorting:
- A collection of hash functions, ciphers, tools, libraries, and materials related to cryptography.☆30Jan 5, 2015Updated 11 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- Portable C Compiler (CVS mirror)☆12Apr 9, 2012Updated 13 years ago
- A set of tools to work with cgroup tree and process classification/QoS according to it☆10Oct 1, 2019Updated 6 years ago
- Tools and library to manipulate EFI variables.☆10Mar 2, 2026Updated last week
- Collecting data from the state of UDP buffers☆14Jan 30, 2017Updated 9 years ago
- Generator of "nothing-up-my-sleeve" constants☆24Jul 3, 2015Updated 10 years ago
- Create shellcode from executable or assembly code☆12Jul 31, 2017Updated 8 years ago
- 🦑 A friendly Ruby API to iptables.☆15May 6, 2017Updated 8 years ago
- Kernel function hooking using exception tables☆28Jun 15, 2018Updated 7 years ago
- collection of Libav topic branches☆25May 21, 2019Updated 6 years ago
- rant blog about CryptoTrooper ransomware, its history, legacy and MalwareTech case☆12Jan 26, 2019Updated 7 years ago
- Fork of the last BSD licensed release of PolarSSL / XySSL. This repository is an import from http://gitorious.org/tropicssl☆22Apr 18, 2012Updated 13 years ago
- Memory forensic tool for process resurrection starting from a memory dump☆20Jun 6, 2017Updated 8 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Mar 14, 2014Updated 11 years ago
- runtime code injector for Linux☆26May 29, 2011Updated 14 years ago
- I publish here my patch sets for Linux☆31Apr 21, 2019Updated 6 years ago
- hook: linux kernel syscall hijack☆21Dec 28, 2016Updated 9 years ago
- Operating systems playground.☆16Sep 3, 2019Updated 6 years ago
- a simple irc bouncer written in go☆17Jun 9, 2018Updated 7 years ago
- Frexx C preprocessor (single C file version)☆31May 21, 2017Updated 8 years ago
- Thread Injection Kit. A notorious little attempt to create Windows CreateRemoteThread() equivalent on unix (*nix) platform.☆49Jul 10, 2011Updated 14 years ago
- Power Vector Library☆32Dec 2, 2025Updated 3 months ago
- Reference implementations (software)☆85Nov 11, 2016Updated 9 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Apr 20, 2015Updated 10 years ago
- Recon materials☆27Nov 18, 2017Updated 8 years ago
- Arp spoof detection tool☆26Jun 30, 2017Updated 8 years ago
- Data over audio☆84Sep 25, 2018Updated 7 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆95Jun 13, 2021Updated 4 years ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- Rust bindings to aubio☆11Apr 13, 2020Updated 5 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- A fake libpulse.so library that mimics pulseaudio behavior for skype☆26Jun 3, 2017Updated 8 years ago
- Damn vulnerable linux device driver for people to play with.☆28Feb 25, 2020Updated 6 years ago
- Configuration and Programs for activating IMU data on Emlid Reach☆11Feb 4, 2018Updated 8 years ago
- Searches for interesting cached DNS entries.☆55May 15, 2014Updated 11 years ago
- Reverse-engineering tools for Android applications☆56Aug 2, 2011Updated 14 years ago
- a grep -r for secrets☆179May 4, 2022Updated 3 years ago
- ☆19Jun 9, 2016Updated 9 years ago