Explore >> Select a destination


You are here

dayzerosec.com
| | raelize.com
4.9 parsecs away

Travel
| | Raelize provides top-notch embedded device security serrvices like consultancy, testing, research and training.
| | sergioprado.blog
4.1 parsecs away

Travel
| | This article is going to be an introduction to embedded Linux security.
| | cocomelonc.github.io
5.2 parsecs away

Travel
| | [AI summary] The provided text describes a C/C++ implementation of the Khufu encryption algorithm, used to encrypt and decrypt a payload for a potential malicious purpose. The code demonstrates how to use the algorithm to encrypt a shellcode payload, execute it via Windows APIs, and avoid detection by AV engines. Key points include the encryption process, the use of Windows API functions for execution, and the limited AV detection due to obfuscation and API calls rather than encryption. The text also mentions the resistance of Khufu to differential cryptanalysis but notes that a 16-round attack exists. The example is for educational purposes only.
| | neilmadden.blog
24.0 parsecs away

Travel
| This is the third part of my series on Key Encapsulation Mechanisms (KEMs) and why you should care about them. Part 1 looked at what a KEM is and the KEM/DEM paradigm for constructing public key encryption schemes. Part 2 looked at cases where the basic KEM abstraction is not sufficient and showed how it...