Show HN: Opasm, an Assembly REPL

Show HN (score: 13)
Found: July 02, 2025
ID: 70

Description

CLI Tool
Show HN: Opasm, an Assembly REPL This is a fun repl for running arbitrary assembly commands, right now it supports x86, X86_64, arm, aarch64, but there's not a big reason that I can't add support for other qemu/capstone/unicorn/ keystone supported architectures, just have to do it

More from Show

Show HN: SecretMemoryLocker – File Encryption Without Static Passwords

Show HN: SecretMemoryLocker – File Encryption Without Static Passwords I built SecretMemoryLocker (<a href="https:&#x2F;&#x2F;secretmemorylocker.com" rel="nofollow">https:&#x2F;&#x2F;secretmemorylocker.com</a>), a file encryption tool that generates keys dynamically from your answers to personal questions instead of using a static master password. This makes offline brute-force attacks much more difficult. Think of it as a password manager that meets mnemonic seed recovery, but without storing any sensitive keys on disk.<p>Why? I kept losing master passwords and wanted a solution that wasn&#x27;t tied to a single point of failure. I also wanted to create a &quot;digital legacy&quot; that my family could access only under specific conditions. The core principle is knowledge-based encryption: the key only exists in memory when you provide the correct answers.<p>Status: * MVP is ready for Windows (.exe). * Linux and macOS support is planned. * UI is available in English, Spanish, and Ukrainian.<p>Key Features:<p>* No Static Secrets: No master password or seed phrase is ever stored. The key is reconstructed on the fly.<p>* Knowledge-Based Key Generation: The final encryption key is derived from a combination of your personal answers and file metadata.<p>* Offline Brute-Force Resistance: Uses MirageLoop, a decoy system that activates when incorrect answers are entered. Instead of decrypting real data, it generates an endless sequence of AI-created questions from a secure local database, creating an illusion of progress while keeping your real data untouched.<p>* Offline AI Generation Mode: Optional offline Q&amp;A generator (prototype).<p>How It Works (Simplified):<p>1) Files are packed into an AES-256 encrypted ZIP archive.<p>2) A JSON key file stores the questions in an encrypted chain. Each subsequent question is encrypted with a key derived from the previous correct answer and the file&#x27;s hash. This forces you to answer them sequentially.<p>3) The final encryption key for the ZIP file is derived by combining the hashes of all your correct answers. The key derivation formula looks like this:<p><pre><code> K_final = SHA256(H(answer1+file_hash) + H(answer2+file_hash) + ...) </code></pre> (Note: We are aware that a fast hash like SHA256 is not ideal for a KDF. We plan to migrate to Argon2 in a future release to further strengthen resistance against brute-force attacks.)<p>To encrypt, you provide a file. This creates two outputs: your_file.txt → your_file_SMLkey.json + your_file_SecretML.zip<p>To decrypt, you need both files and the correct answers.<p>Install &amp; Quick Start: Download the EXE from GitHub Releases (no dependencies needed):<p><a href="https:&#x2F;&#x2F;github.com&#x2F;SecretML&#x2F;SecretMemoryLocker&#x2F;releases" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;SecretML&#x2F;SecretMemoryLocker&#x2F;releases</a><p>Encrypt:<p><pre><code> SecretMemoryLocker.exe --encrypt &quot;C:\docs\important.pdf&quot; </code></pre> Decrypt:<p><pre><code> SecretMemoryLocker.exe --decrypt &quot;C:\docs\important_SMLkey.json&quot; </code></pre> I would love to get your feedback on the concept, the user experience, and any security assumptions I&#x27;ve made. Thanks!

No other tools from this source yet.