Skip to content

Instantly share code, notes, and snippets.

View michele-tn's full-sized avatar
🎯
Focusing

michele-tn

🎯
Focusing
View GitHub Profile

1. Introduction and scope

Hash functions are ubiquitous in information security: they are used for integrity checks, content-addressed storage, digital signatures, password verification, and more. This document treats three families of constructions that have received the most attention in practice and in the literature: MD5 (an historical design of the MD family), SHA-2 (notably SHA-256, standardized in FIPS 180), and SHA-3 (the Keccak-based family standardized in FIPS 202). Where necessary we contrast the design principles (MerkleDamgrd vs. sponge) and explain the consequences for security. Key primary sources are cited: the MD5 specification (RFC 1321), the SHA standards (FIPS 180-4), the SHA-3 standard (FIPS 202), and major cryptanalytic work on MD5 and related constructions. citeturn0search0turn0search7turn3search2


2. Formal definitions and basic security notions

Let (H:{0,1}^* o{0,1}^n) be a deterministic function mapping binary strings of arbitrary length to fixed-length (n)-bit o

Database Normalization: From 1NF to 6NF

Database normalization is a fundamental methodology in relational database design. Its main objectives are:

  • Reduce redundancy
  • Prevent anomalies
  • Maintain data integrity

This document provides an overview of the six normal forms, including BCNF, with practical examples.


DNS Speed Test Script

A simple Bash script to measure and compare DNS query response times from popular public DNS servers.
Outputs aligned ASCII tables showing raw and sorted results by speed.


Tested Environment

πŸš€ Advanced Network Stress-Testing in C#

SYN Flood & UDP Flood with Random Source IP and MAC


network icon

Simulate DDoS/DoS Attacks for Penetration Testing (Linux, C#, Raw Sockets)

πŸš€ [#SCADA LANGUAGE] Videojet DataFlex 6420 β€” Zipher Text Communications Protocol Example

This README demonstrates how to communicate with a Videojet printer using the Zipher Text Communications Protocol, as detailed in the official documentation:

πŸ“„ Protocol PDF: Zipher Text Coms Protocol v1.21


πŸ”§ Purpose

πŸš€ Automated Reverse SSH Port Forwarding

πŸ” A Windows Service for Secure SSH Tunneling & Multi-Port Forwarding

πŸ›  Features

βœ… Automated Reverse Port Forwarding – Supports 22, 3389, 5800, 5900
βœ… Windows Service Mode – Prevents accidental termination
βœ… Auto-Reconnect – If disconnected, reconnects automatically
βœ… Encrypted Passphrase – Loads AES-encrypted passphrase from file
βœ… Embedded Private Key Security – Uses Renci.SshNet for seamless authentication

πŸ› οΈ How to Create VLANs via SSH on OpenWRT Routers (e.g., GL.iNet Mango)

This README provides a step-by-step guide on how to create VLANs on OpenWRT-based routers (such as GL.iNet Mango) using the command-line interface via SSH. VLANs (Virtual LANs) enable network segmentation for enhanced security and management.


πŸ“‹ Requirements

  • OpenWRT-compatible router (e.g., GL.iNet Mango)
  • SSH access to the router

πŸ–±οΈ Windows 11 - Restore Classic Context Menu

This GITS provides batch scripts to enable and disable the classic right-click context menu in Windows 11.


πŸ“‹ Description

Windows 11 introduced a new modern-style context menu. If you prefer the classic Windows 10-style menu, these scripts modify the Windows Registry to bring it back.

πŸ›‘οΈ Backup and Restore GRUB Configuration to Prevent Boot Issues

Ensure your Linux system remains bootable by backing up GRUB and the Master Boot Record (MBR).


πŸ“˜ Overview

GRUB (GRand Unified Bootloader) is a critical part of the Linux boot process.
Misconfiguring or damaging it can lead to system boot failures.