All Pages (By Popularity)

This is a list of all pages on this web site, sorted on the amount of upvotes and downvotes visitors have given them. Please upvote the pages you like and downvote the ones you don't.

13755
Online x86 / x64 Assembler
Assemble x86 and x64 code in your browser!
8474
Big Number Calculator
A tool for calculating with huge numbers.
2419
PIE Bin
A pastebin with both client-side and server-side encryption.
1544
Timing Side Channel Port Scanner in the Browser
How web pages can use a timing side channel to "scan" your local network.
1531
Online Hash Calculator
A tool for computing hashes (MD5, SHA1, SHA2, etc.) of text and files.
1314
PBKDF2 for PHP
A fast implementation of the PBKDF2 key stretching function in PHP.
1254
EncFS Security Audit
The results of an EncFS security audit.
960
TRENT - Trusted Random Entropy
A free trusted third party random number generator.
704
Hashes of TrueCrypt Version 7.1a Files
Hashes of all files from the last version of TrueCrypt
700
How do we model this robot?
The difference between Computational Ability and Informational Ability
661
HTML Escape Tool
A tool for HTML-escaping text so that it looks and behaves exactly like it does in a text editor.
619
Blind Birthday Attack
A birthday attack without knowing what the collision actually is.
606
Encryption - CBC Mode IV: Secret or Not?
Should the IV in CBC mode be kept secret?
568
Honestyware
A philosophy for selling software and other digital content on the internet.
490
Bochs Disk Images
Disk images for the Bochs x86 emulator.
488
TrueCrypt's Plausible Deniability is Theoretically Useless
Why you really ought to have a hidden volume, even if you don't need one.
485
Backup Verifier Script (Ruby)
A Ruby script that compares two directories and reports the differences.
485
My Vim Configuration
My configuration of the Vim text and code editor.
484
Reading List
A list of the books I have read.
478
Is Security Local?
Is security a locally-verifiable property of computation?
475
Encrypting One Time Passwords (EOTP)
EOTP is a cryptographic One Time Password (OTP) protocol designed to provide a static encryption key across login sessions.
447
High-Security Offline Password Generator
A secure random password generator for Windows, Linux, and Mac.
434
eCryptfs Security Audit
The results of an eCryptfs security audit.
432
The PUP Confusion Technique
Undetecting malware by making it look like a Potentially Unwanted Program (PUP).
429
Advice to Aspiring Computer Security Engineers/Scientists
Some advice for new computer science students based on my experience.
425
HelloWorld! - A Light & Secure CDS for PHP
A lightweight, ultra-secure, CMS/CDS for PHP
418
ZeroBin Security Audit
A security audit of the ZeroBin pastebin.
417
Using the Vim Editor for Syntax Highlighting in PHP
Generate syntax-highlighted code automatically in PHP with Vim.
412
Asus G Series Keyboard Design Error
Fixing a problem with the keyboard in an ASUS laptop.
355
Practical Race Condition Vulnerabilities in Web Applications
An example of a web application (PHP) vulnerable to a race condition, and how to fix it.
352
Web Browser Cryptography is a Good Thing
Why we should support the development of browser-based crypto applications.
321
GnuTLS Pre-Shared Key Client-Server Example
How to establish an SSL/TLS connection with GnuTLS and PSK authentication.
302
"Privacy Aware" Unique Hit Counter for PHP
A simple hit counter that stores only a hash of your visitor's IP address.
287
Exploiting C++ VTABLES: Instance Replacement
Use a memory corruption vulnerability to change an instance of class A into an instance of class B.
274
Email Spoofing in Ruby
A Ruby script for spoofing email to SMTP servers.
274
FLUSH+RELOAD: Multi-User Systems are Doomed
The FLUSH+RELOAD side-channel attack breaks the security of multi-user systems.
259
Data Flow in Web Applications
A look at the flow of data in web applications and how it can be tamed for security.
253
Centripetal Acceleration
Deriving the centripetal acceleration equation.
252
Cracking Synergy's Bad Cryptography
A tool to crack Synergy's homebrew cryptography.
241
Triangle of Secure Code Delivery
Three properties necessary and sufficient for delivering code safely.
232
Password Hashing After the PHC
Giving authenticators an advantage over password crackers with cache.
215
Forcing HTML/CSS Background Color to Print
How to force browsers to print the background color of HTML elements (using images).
214
Centralization is Killing Bitcoin
An article on Bitcoin, centralization, and DDoS attacks.
207
How to Encrypt Data in PHP
The right way to encrypt data in PHP.
172
The Cheese Universe Paradox
A formal proof that the universe is made entirely of cheese.
170
Bochs Hacking Guide
Hacking the Bochs x86 CPU emulator.
146
The New York Times and Algebra
The New York Times does not (necessarily) fail at algebra.
138
Sockstress DoS Tool
A public domain C implementation of the sockstress DoS attack.
122
A Manual Random Number Generator
Generating random numbers with paper coins.
111
Hash0 Security Audit
A security audit of the Hash0 pastebin.
110
Mitigating BREACH in PHP
PHP code for mitigating the BREACH attack.
103
Salted Hash Cracking PHP Script
A script for cracking hashes when all you have is PHP.
80
PEFS Security Audit
Security audit of the Private Encrypted File System (PEFS).
46
Confirmed: Microsoft Visits Links You Send In Skype
I sent a link through Skype and Microsoft visted it, confirming The H's claims.
45
Send a Message to the Future
Save a message that will become readable after quantum computers are built.
32
Concentration Bounds from Parallel Repetition Theorems
My master's thesis, showing how concentration bounds can be derived from parallel repetition theorems for nonlocal games and interactive proofs.
31
Gocryptfs Security Audit
A security audit of the gocryptfs encrypted filesystem.
14
A Simple Proof of Gödel's Second Incompleteness Theorem Using Turing Machines
Proving Gödel's second incompleteness theorem in a way that should be understandable to anyone who understands the proof that the halting problem is undecidable.
7
A Plausible Reason It's So Hard To Prove P!=NP
Attempting to show why P!=NP is hard to prove using hash functions.
6
Making Zcash Light Wallets Faster and More Private - ZecSec
Making Zcash Light Wallets Faster and More Private - ZecSec
5
`vfy` Directory Comparer
A directory comparison tool for checking if backups have been completed or restored successfully.
5
ZecSec Roadmap for 2023 - ZecSec
ZecSec Roadmap for 2023 - ZecSec
4
Security Audit of zecwallet-lite-cli - ZecSec
Security Audit of zecwallet-lite-cli - ZecSec
4
DAWr - Audio Playground for Rust
A simple DAW library for Rust with a wavetable synthesizer, sampler, and audio effects.
4
CrackStation's Hash Cracking Utility
The indexing and lookup code behind CrackStation.net's hash cracking service.
3
ZecSec - Zcash Ecosystem Security
Zcash ecosystem security research, audits, and vulnerability disclosures by the ZecSec project.
3
Results of Auditing Hanh's Shielded Zcash Ledger App - ZecSec
Results of Auditing Hanh's Shielded Zcash Ledger App - ZecSec
1
If you used libbitcoin-explorer (bx) to generate your seed phrase, rotate it ASAP! - ZecSec
If you used libbitcoin-explorer (bx) to generate your seed phrase, rotate it ASAP! - ZecSec
1
Security Engineering from Safety-Critical Disciplines
Useful concepts and methods from safety engineering, applied to computer security.
1
October Update: Ywallet audited, and what's next? - ZecSec
October Update: Ywallet audited, and what's next? - ZecSec
0
Negative Feedback for Insecure Connections
Should web browser interfaces provide negative feedback when the connection is insecure?
0
Instruction Filters as an Exploitation Defense
Disabling CPU instructions to thwart ROP and other attacks.
0
Claude Code Status Line
A custom status line for Claude Code showing context usage, costs, and git branch.
0
PoC || GTFO Mirror
Mirror of all the PoC || GTFO issues.
-1
Free2Z Security Audit Results - ZecSec
Free2Z Security Audit Results - ZecSec
-2
Security Audit Process - ZecSec
Security Audit Process - ZecSec
-2
ZecSec's Q1 2023 Transparency Report - ZecSec
ZecSec's Q1 2023 Transparency Report - ZecSec
-2
ZGo Security Audit Results - ZecSec
ZGo Security Audit Results - ZecSec
-2
Mitigating 51% Attack Risk on the Zcash Network - ZecSec
Mitigating 51% Attack Risk on the Zcash Network - ZecSec
-2
The Future of Zcash Ecosystem Security - ZecSec
The Future of Zcash Ecosystem Security - ZecSec
-3
A Simple Threat Model for Zcash Shielded Hardware Wallets - ZecSec
A Simple Threat Model for Zcash Shielded Hardware Wallets - ZecSec
-3
Scalable Private Money Needs Scalable Anonymous Messaging - ZecSec
Scalable Private Money Needs Scalable Anonymous Messaging - ZecSec
-4
Computer Science Video Lecture Collection
A collection of computer science related videos from various universities.
-4
YWallet Audit Results Published - ZecSec
YWallet Audit Results Published - ZecSec
-4
Risk Analysis of Intel's SGX and Other TEEs - ZecSec
Risk Analysis of Intel's SGX and Other TEEs - ZecSec
-5
Contributors
A list of people and organizations that have contributed to Defuse Security.
-5
ZecSec's Q4 2022 Transparency Report - ZecSec
ZecSec's Q4 2022 Transparency Report - ZecSec
-6
wavetool - Serum Wavetable Processor
A command-line tool for processing and analyzing Serum wavetables.
-8
Side-Channel Attacks on Everyday Applications
My Black Hat USA 2016 talk about the Flush+Reload side channel.
-8
Fractal Zoom
A psychedelic short story.
-13
File System Events Leak Folder Contents
An information disclosure vulnerability in Windows shared folders that lets you see what's in folers you can't access.
-105
Combat in X-Plane 10
How to configure X-Plane 10 for combat.
-144
Generating Random Passwords in PHP
How to generate unbiased passwords in PHP (plus some common mistakes).