zv / SHA3ImplementedInsideofaRARfileLinks
The Keccak hash algorithm implemented inside of a RAR archive using the RAR filter assembly language
☆23Updated 10 years ago
Alternatives and similar repositories for SHA3ImplementedInsideofaRARfile
Users that are interested in SHA3ImplementedInsideofaRARfile are comparing it to the libraries listed below
Sorting:
- Collection of OpenStack Terraform modules (WIP)☆11Updated 7 months ago
- Hardware Accelerated Cold-Boot Attacks☆12Updated 8 years ago
- Slides from Public Talks☆18Updated 3 years ago
- cpufuzz is a dumb, simple and portable CPU fuzzer☆11Updated 6 years ago
- This repo, while only occupying around 224K on disk for servers/mirror repos, expands to around 101GB when cloned normally, as the object…☆11Updated 4 years ago
- Backscatter and Crosstalk related Side Channel Attacks in modern Optical Networks.☆11Updated last year
- A GNU/Linux specific toolkit for making and managing jails which are OS level virtualization containers. Implemented using shell scripts …☆10Updated 4 months ago
- Network based steganography based control channels and chat.☆8Updated 9 years ago
- A simple Jupyter Notebook to graph a users commit history over time, specifically looking at the author of the xz backdoor.☆21Updated last year
- advanced code generator for John the Ripper☆13Updated 7 years ago
- Warning! Don't run this code on your computer.☆15Updated 6 years ago
- A mod to add much more powerful endgame weaponry and defences, to stand up to mods like Natural Evolution and DyTech.☆11Updated last year
- Very simple cross-platform utility to manage your git identities.☆10Updated 2 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Updated 4 years ago
- Formation Angular (niveau débutant) - Angular training (beginner level)☆10Updated 3 months ago
- A list of backdoor samples I find online.☆13Updated 5 years ago
- Linux Kernel Debugger☆19Updated 4 years ago
- betrusted.io main SoC design☆12Updated 5 years ago
- A bunch of library code that can easily be included in new/prototype projects with few (usually zero) dependencies, even on themselves.☆11Updated 4 years ago
- GUI manager for network tunnels developed for Command and Control systems.☆11Updated 2 years ago
- Tools created for the DARPA Cyber Grand Challenge that visualize software execution based on traces generated by the CGC Monitor and a Un…☆14Updated 7 years ago
- Binary and Static Releases☆15Updated last week
- ☆16Updated 4 years ago
- Diebold Accuvote-TSx Election Machine Hacking☆39Updated 5 years ago
- A lightweight http server for linux☆17Updated last month
- Digital Forensics date and time☆24Updated 6 months ago
- Dump Windows registry hives as text.☆16Updated 6 years ago
- A side-channel attack vector based on interrupt latency against enclave execution of Intel SGX☆10Updated 4 years ago
- Collection of Windows Driver Utils☆11Updated last year
- Capturing audio (.wav) from target using a link☆14Updated 5 years ago