Menu
Night Mode
×
Home
Home
About Defuse
Contact
Vulnerability Disclosure
Old Blog 1
Old Blog 2
X/Twitter
Bluesky
GitHub
Services
Security Auditing
Encrypted Pastebin
Online x86 Assembler
Big Number Calculator
Checksum Calculator
HTML Escaper
TRENT – Trusted Drawings
Quantum Time Capsule
CrackStation Hash Cracker
Software
`vfy` Directory Comparer
`passgenr` Password Generator
Deprecated
Ruby Backup Checker
HelloWorld! Secure CMS
PHP Hash Cracker
Projects & Code
`php-encryption` Library
`DAWr` Audio Playground
`wavetool` Wavetable Processor
Hash Cracking Utility
HTML Force Print Background Color
Deprecated
Bochs Disk Images
GnuTLS PSK Example
Ruby Email Spoofing
PHP & Vim Highlighting
PHP Hit Counter
PBKDF2 For PHP
PHP Random Passwords
Research
Vulnerabilities & Exploits
Side Channels in Everyday Apps
FLUSH+RELOAD
C++ VTABLES
Cracking Synergy
Sockstress
Browser Port Scanner
PHP BREACH Defense
Race Conditions in Web Apps
Windows File-System Event Leakage
PUP Confusion
Instruction Filter RCE Defense
Audits
ZGo
zecwallet-lite-cli
Zcash Ledger App
Free2Z
YWallet
EncFS
eCryptfs
ZeroBin
PEFS
Hash0
Gocryptfs
GlobaLeaks
Security Audit Process
Cryptography
Light Wallet Privacy
Blind Birthday Attack
CBC Mode IV Security
TrueCrypt & Game Theory
Browser Cryptography
RDRAND Backdoor
ZecSec
ZecSec Project Overview
Audit: ZGo
Audit: zecwallet-lite-cli
Audit: Zcash Ledger App
Audit: Free2Z
Audit: YWallet
Future of ZecSec
Mitigating 51% Attacks
milk-sad Vulnerability
Safety Engineering Talk
HW Wallet Threat Model
Intel SGX Risk Analysis
Light Wallet Privacy
2023 Roadmap
Security Audit Process
Scalable Anonymous Messaging
October Update
Q1 2023 Transparency Report
Q4 2022 Transparency Report
Passwords
Hash Caching
Salted Password Hashing
Theory
My Master's Thesis
Robot Modelling
Is Security Local?
Why It's Hard To Prove P!=NP
Gödel's Second Theorem
Other
Safety Engineering Talk
Hacking Bochs
Secure Code Delivery
Website Security
BitCoin Centralization
Negative http:// Feedback
Skype Spying
Miscellaneous
My Vim Configuration
Claude Code Status Line
Reading List
Advice for CS Students
CS Lecture Links
NYT Algebra
X-Plane Combat
Fractal Zoom
Cheese Universe
Paper Coin TRNG
ASUS G51 Keyboard
Honestyware
Centripetal Acceleration
Contributors
Website Source Code
Mirrors
PoC || GTFO Mirror
TrueCrypt Hashes
Recent
Claude Code Status Line
February 22, 2026
`vfy` Directory Comparer
February 7, 2026
Fractal Zoom
November 15, 2024
A Simple Proof of Gödel's Second Incompleteness Theorem Using Turing Machines
February 9, 2024
ZGo Security Audit Results - ZecSec
January 5, 2024
The Future of Zcash Ecosystem Security - ZecSec
September 24, 2023
more...
Security Audit of zecwallet-lite-cli - ZecSec
September 23, 2023
Results of Auditing Hanh's Shielded Zcash Ledger App - ZecSec
September 21, 2023
Mitigating 51% Attack Risk on the Zcash Network - ZecSec
September 21, 2023
Free2Z Security Audit Results - ZecSec
September 14, 2023
If you used libbitcoin-explorer (bx) to generate your seed phrase, rotate it ASAP! - ZecSec
August 11, 2023
Security Engineering: Learning from Safety-Critical Disciplines
July 31, 2023
ZecSec's Q1 2023 Transparency Report - ZecSec
April 18, 2023
A Simple Threat Model for Zcash Shielded Hardware Wallets - ZecSec
April 15, 2023
Risk Analysis of Intel's SGX and Other TEEs - ZecSec
March 10, 2023
Making Zcash Light Wallets Faster and More Private - ZecSec
March 2, 2023
ZecSec's Q4 2022 Transparency Report - ZecSec
January 27, 2023
ZecSec Roadmap for 2023 - ZecSec
January 3, 2023
YWallet Audit Results Published - ZecSec
January 3, 2023
Security Audit Process - ZecSec
December 29, 2022
Scalable Private Money Needs Scalable Anonymous Messaging - ZecSec
November 15, 2022
October Update: Ywallet audited, and what's next? - ZecSec
October 28, 2022
A Plausible Reason It's So Hard To Prove P!=NP
January 5, 2022
Concentration Bounds from Parallel Repetition Theorems
August 23, 2018
Gocryptfs Security Audit
March 3, 2017
Side-Channel Attacks on Everyday Applications (Black Hat 2016)
August 3, 2016
Is Security Local?
May 27, 2015
Port Scanning Local Network From a Web Browser
April 12, 2015
How do we model this robot?
March 25, 2015
Advice to Aspiring Computer Engineers and Scientists
February 16, 2015
Does the New York Times Fail at Algebra? (No.)
January 4, 2015
Triangle of Secure Code Delivery
July 24, 2014
Blind Birthday Attack
July 13, 2014
TrueCrypt 7.1a Hashes
May 31, 2014
Centripetal Acceleration
April 29, 2014
Hash0 Security Audit
April 13, 2014
Negative Feedback for Insecure Connections
March 6, 2014
PEFS Security Audit
February 14, 2014
ZeroBin Security Audit
February 2, 2014
eCryptfs Security Audit
January 22, 2014
EncFS Security Audit
January 15, 2014
EncFS Security Audit
January 15, 2014
Manually Generating Random Numbers
January 4, 2014
Bochs Hacking Guide
January 2, 2014
Instruction Filters as an Exploitation Defense
January 2, 2014
Disk Images for the Bochs x86 Emulator
December 6, 2013
Implications of the FLUSH+RELOAD Side-Channel Attack
September 15, 2013
Should CBC Mode Initialization Vector Be Secret - Defuse Security
September 8, 2013
PHP Code for Mitigating the BREACH attack on SSL/TLS.
August 9, 2013
Password Hashing After PHC
July 26, 2013
Cracking Synergy's Bad Cryptography
July 20, 2013
Combat in X-Plane: Weapon Setup, Enemy Aircraft, and Targeting
July 19, 2013
Confirmation of H-Online's Skype Results: Microsoft Visits Links
May 16, 2013
Instance Replacement: Exploiting C++ VTABLES
May 11, 2013
GnuTLS Pre-Shared Key (PSK) Client-Server Example Code
April 18, 2013
The meaning of "IF" -- An Introduction to Formal Logic
March 30, 2013
The Universe is Made of Cheese - A Formal Proof
March 11, 2013
TrueCrypt's Plausible Deniability (Hidden Volumes) is Theoretically Useless
March 2, 2013
Computer Science Video Lecture Collection
February 9, 2013
Web Browser Cryptography is a Good Thing
January 23, 2013
#pdftribute
January 15, 2013
Encrypting Data in PHP (HowTo) - Defuse Security
November 14, 2012
Spoofing SMTP email with a Ruby script - Defuse Security
October 30, 2012
Scripting Vim's HTML syntax highlighting in PHP
August 24, 2012
Script for Comparing Folders and Validating Backups
July 29, 2012
Sockstress Denial of Service Tool & Source Code - Defuse Security
April 15, 2012
Salted Hash Cracking PHP Script - Defuse Security
April 3, 2012
Generating Unbiased Random Passwords in PHP
February 29, 2012
Practical Race Condition (TOCTTOU) Vulnerabilities in Web Applications - Defuse Security
December 21, 2011
HTML/CSS Force Printing of Background Color - Defuse Security
November 4, 2011
PBKDF2 Password Hashing for PHP
September 6, 2011
Password Policy Hall of SHAME - Defuse Security
July 7, 2011
BitCoin Centralization - DDoS Attacks on Pools & Mt. Gox Hacked - Defuse Security
June 22, 2011
The PUP Confusion Antivirus Detection Evasion Technique - Defuse Security
June 12, 2011
Web Application Security - Defuse Security
June 12, 2011
File System Events Disclose NTFS Protected Folder Contents - Defuse Security
June 12, 2011
X/Twitter
·
GitHub
·
Bluesky
Home
About Defuse
Contact
Vulnerability Disclosure
Old Blog 1
Old Blog 2
X/Twitter
Bluesky
GitHub
Services
Security Auditing
Encrypted Pastebin
Online x86 Assembler
Big Number Calculator
Checksum Calculator
HTML Escaper
TRENT – Trusted Drawings
Quantum Time Capsule
CrackStation Hash Cracker
Software
`vfy` Directory Comparer
`passgenr` Password Generator
Deprecated
»
Ruby Backup Checker
HelloWorld! Secure CMS
PHP Hash Cracker
Projects & Code
`php-encryption` Library
`DAWr` Audio Playground
`wavetool` Wavetable Processor
Hash Cracking Utility
HTML Force Print Background Color
Deprecated
»
Bochs Disk Images
GnuTLS PSK Example
Ruby Email Spoofing
PHP & Vim Highlighting
PHP Hit Counter
PBKDF2 For PHP
PHP Random Passwords
Research
Vulnerabilities & Exploits
»
Side Channels in Everyday Apps
FLUSH+RELOAD
C++ VTABLES
Cracking Synergy
Sockstress
Browser Port Scanner
PHP BREACH Defense
Race Conditions in Web Apps
Windows File-System Event Leakage
PUP Confusion
Instruction Filter RCE Defense
Audits
»
ZGo
zecwallet-lite-cli
Zcash Ledger App
Free2Z
YWallet
EncFS
eCryptfs
ZeroBin
PEFS
Hash0
Gocryptfs
GlobaLeaks
Security Audit Process
Cryptography
»
Light Wallet Privacy
Blind Birthday Attack
CBC Mode IV Security
TrueCrypt & Game Theory
Browser Cryptography
RDRAND Backdoor
ZecSec
»
ZecSec Project Overview
Audit: ZGo
Audit: zecwallet-lite-cli
Audit: Zcash Ledger App
Audit: Free2Z
Audit: YWallet
Future of ZecSec
Mitigating 51% Attacks
milk-sad Vulnerability
Safety Engineering Talk
HW Wallet Threat Model
Intel SGX Risk Analysis
Light Wallet Privacy
2023 Roadmap
Security Audit Process
Scalable Anonymous Messaging
October Update
Q1 2023 Transparency Report
Q4 2022 Transparency Report
Passwords
»
Hash Caching
Salted Password Hashing
Theory
»
My Master's Thesis
Robot Modelling
Is Security Local?
Why It's Hard To Prove P!=NP
Gödel's Second Theorem
Other
»
Safety Engineering Talk
Hacking Bochs
Secure Code Delivery
Website Security
BitCoin Centralization
Negative http:// Feedback
Skype Spying
Miscellaneous
My Vim Configuration
Claude Code Status Line
Reading List
Advice for CS Students
CS Lecture Links
NYT Algebra
X-Plane Combat
Fractal Zoom
Cheese Universe
Paper Coin TRNG
ASUS G51 Keyboard
Honestyware
Centripetal Acceleration
Contributors
Website Source Code
Mirrors
»
PoC || GTFO Mirror
TrueCrypt Hashes
Night Mode
January 15, 2013
#pdftribute
Small:
Download pdftribute.tex
Download pdftribute.pdf
Big:
Download pdftribute-big.tex
Download pdftribute-big.pdf