AmmarkoV / AmmarServerLinks
A lightweight http server for linux
☆16Updated this week
Alternatives and similar repositories for AmmarServer
Users that are interested in AmmarServer are comparing it to the libraries listed below
Sorting:
- The Keccak hash algorithm implemented inside of a RAR archive using the RAR filter assembly language☆23Updated 10 years ago
- Simple binary file disassembler based on libopcodes and bfd from binutils.☆27Updated 9 years ago
- Multi-architecture CPU Emulator☆14Updated 7 years ago
- Very simple cross-platform utility to manage your git identities.☆10Updated 2 years ago
- just give me a unix shell☆33Updated 2 years ago
- A list of backdoor samples I find online.☆13Updated 5 years ago
- Simplified version of flashrom for installing new system firmware☆22Updated 2 years ago
- An IP-Transparent Tor Hidden Service and I2P Connector☆16Updated 12 years ago
- A clone of FD (File & Directory tool) by T.Shirai☆13Updated 11 years ago
- OFTC's branch of Hybrid IRCd☆24Updated last year
- Library to support various Hash-based Message Authentication Codes (HMAC)☆10Updated 7 months ago
- fuzz code from openssl updated to target libressl☆18Updated last year
- Dalvik Header Plugin for IDA Pro☆22Updated 12 years ago
- Collating patches for gpart from all distributions☆29Updated last year
- A linux-like su/sudo on Windows. Transferred from https://github.com/DoubleLabyrinth/WindowsSudo.☆33Updated 5 years ago
- Block pages hosted on censorship sites all around the world.☆14Updated 2 years ago
- Library and tools to access the Extended File System☆18Updated 5 months ago
- Sample of standalone portable C to verify Ed25519 public-key signature☆20Updated 8 years ago
- A library which makes modification of browsers' behavior easy.☆10Updated 4 years ago
- A socket to rule all other sockets.☆9Updated 9 years ago
- File antivirus☆10Updated 5 years ago
- An overlay that verifies signed ELF binaries☆9Updated 10 years ago
- NSA - NoScript Anywhere (Firefox Mobile add-on)☆8Updated 9 years ago
- Capturing audio (.wav) from target using a link☆13Updated 5 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. Use it to copy SY…☆15Updated 8 years ago
- OFTC's IRC Services☆36Updated 6 months ago
- This loads DWARF info from an open binary and propagates function names, arguments, and type info☆25Updated last year
- Dump Windows registry hives as text.☆16Updated 6 years ago
- runtime code injector for Linux☆27Updated 14 years ago
- Library to support cross-platform AES encryption☆12Updated 8 months ago