Skip to content
View dj311's full-sized avatar
🤙
🤙

Highlights

  • Pro

Block or report dj311

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned Loading

  1. epd-wm epd-wm Public

    Wayland compositor/window manager that outputs to IT8951 E-Paper displays (WIP).

    C 26 5

  2. remote-timing-attacks-are-practical remote-timing-attacks-are-practical Public archive

    An attempt to replicate the attack in Brumley and Boneh's "Remote Timing Attacks are Practical" paper. I did not succeed.

    Jupyter Notebook 8 2

  3. rc4-key-recovery-attacks rc4-key-recovery-attacks Public

    Exploits weaknesses in RC4 to mount a chosen-plaintext attack and recover the private key. The vulnerability is similar to the one used to crack WEP, but it targets schemes where the initialisation…

    Python 10 3

  4. computing-separable-functions-via-gossip computing-separable-functions-via-gossip Public

    Implementation of the algorithm in "Computing separable functions via gossip." by Mosk-Aoyama, Damon, and Devavrat Shah.

    Python

  5. firefox-command-palette firefox-command-palette Public

    Control Firefox with Sublime/helm-M-x style fuzzy complete. Use it from the omnibar with the ; search prefix, or trigger a pop-up with Ctrl+Space.

    JavaScript 32 7