Codepoints / unidumpLinks
hexdump(1) for Unicode data
☆39Updated last year
Alternatives and similar repositories for unidump
Users that are interested in unidump are comparing it to the libraries listed below
Sorting:
- Web of trust grapher☆39Updated 7 months ago
- Database of Internet Facing TN3270 Mainframes☆23Updated 10 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 9 years ago
- Combinatorially flip bits by brute force until a file is no longer corrupted.☆11Updated 10 years ago
- Showing entropy analysis examples for different data types. example.sh was used to generate. It utilizes cyphunks libdisorder branch and …☆13Updated 11 years ago
- unarcrypto is an educational tool to depict cryptography usage in zip, rar and 7zip archives☆97Updated 7 years ago
- Hide secret information in typographical errors☆31Updated 10 years ago
- Tiny Hex viewer & editor☆55Updated 8 years ago
- Inject code into a running process☆121Updated 4 years ago
- Cheat sheets for the Portable Document Format☆46Updated 9 years ago
- Encodes data into printable Unicode characters.☆90Updated 9 months ago
- CVE-2018-20377; 20575; 20576; 20577 Multiple security vulnerabilities affecting latest firmware release on ORANGE Livebox modems.☆75Updated 2 years ago
- Insiderer looks inside files for metadata and hidden content☆37Updated 10 years ago
- Install script for grsecurity for Debian environments☆59Updated 10 years ago
- bash script to download publicly available .svn directories☆16Updated 8 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆52Updated 8 years ago
- hashdb block hash database tool and API☆45Updated 6 years ago
- Semantic SSH RSA keys☆25Updated 11 years ago
- unhash is a set of tools designed to enable better password auditing☆120Updated 3 years ago
- Tools to interact with a certificate transparency server☆23Updated 10 years ago
- Host files with DNS☆33Updated 9 years ago
- display unicode character properties☆69Updated last year
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 9 years ago
- Password analysis software☆37Updated 10 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 8 years ago
- IRMA frontend☆25Updated 9 years ago
- 🦈 Tool for visualizing packet captures.☆44Updated 5 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Updated 9 years ago
- Scruffy. The Janitor.☆23Updated this week
- ☆56Updated 8 years ago