Salman Akhtar's repositories
GoogleDorks
Google dorks for OSINT
RISC-V-5-stage-pipelined-in-verilog
RISC-V-5 stage pipelined in verilog
SHA3-Python-3-implementation
Python 3 code for SHA-3 cryptographic algorithm
Hardware-and-Firmware-Security-Guidance
Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, TLBleed, and L1TF/Foreshadow vulnerabilities as well as general hardware and firmware security guidance. #nsacyber
Intelx86assembly-
Intel x86 assembly introductory tutorial for Reverse Engineering and Malware Analysis
malwoverview
Malwoverview is a first response tool to perform an initial and quick triage in a directory containing malware samples, specific malware sample, suspect URL and domains. Additionally, it allows to download and send samples to main online sandboxes.
SHA-3-VHDL-Hardware-implementation
VHDL implementation of SHA-3 Hash
AES-in-VHDL
AES cryptography core in VHDL for FPGA
AutomatedRecon
Automated Recon for port scanning,subdomain enumuration and Web scanning in python
awesome-zero-knowledge-proofs
A curated list of awesome things related to learning Zero-Knowledge Proofs (ZKP).
Bioinformatics_python_Scripts
Python scripts to solve Bioinformatics/Computational Biology tasks
ECE341-AES-VHDL
This was a VHDL project for my archietcture design class that is ABET accredited.
GTFOBins.github.io
Curated list of Unix binaries that can be exploited to bypass system security restrictions
Hardware-Implementation-of-AES-Verilog
Hardware Implementation of Advanced Encryption Standard Algorithm in Verilog
LLLalgorithm_python
LLL algorithm against RSA and ECDSA
NSACodebreaker19
Scripts and Writeups for the NSA Codebreaker Challenge 2019
Python-automation-scripts
Python automation scripts
ReverseEngineeringPractice
Solving reverse engineering challenges and practice to improve my skills
RFSec-ToolKit
RFSec-ToolKit is a collection of Radio Frequency Communication Protocol Hacktools.无线通信协议相关的工具集,可借助SDR硬件+相关工具对无线通信进行研究。Collect with ♥ by HackSmith
SHA-3-verilog-Hardware-implementation
Verilog implementation of SHA 3 Hash Function
Software_based_side_channel_attacks
Software based Side Channel attacks
TheLeopardsH.github.io
A simple spacemacs template on jekyll. https://victorvoid.github.io/space-jekyll-template/