Rogdham / gif-md5-hashquineLinks
GIF displaying its own MD5 (hashquine)
☆77Updated 5 years ago
Alternatives and similar repositories for gif-md5-hashquine
Users that are interested in gif-md5-hashquine are comparing it to the libraries listed below
Sorting:
- ☆95Updated last year
- ☆128Updated 2 years ago
- A possible method for faster-than-light communication☆43Updated last year
- Intel Management Engine JTAG Proof of Concept☆144Updated 5 years ago
- Minimal RarVM Toolchain☆235Updated 10 years ago
- Linux netfilter module to toggle evil bit (RFC 3514) in all outgoing IPv4 packets☆28Updated 7 years ago
- render sprites into your desktop environment as shaped windows using GTK☆20Updated 4 years ago
- Get rickrolled, right in your favourite NSA reverse engineering tool☆77Updated 2 years ago
- IPv4 address turf war!☆71Updated 2 years ago
- ARM is Turing-complete without data fetches☆57Updated 7 years ago
- Modify a message to have a desired CRC signature.☆125Updated 4 years ago
- A simple tool for converting binary files into PNGs for posting on twitter☆62Updated 4 years ago
- Program for extracting TLS keys from Oculus Runtime☆52Updated 5 years ago
- playing with DDR DRAM bus fault injection☆92Updated 11 months ago
- A backward-compatible subset of the PNG file format, for uncompressed bitmaps☆24Updated 11 months ago
- a simple script to simulate random "cosmic ray" memory errors against a linux process☆13Updated last year
- ☆114Updated 2 years ago
- ☆70Updated 2 years ago
- Make a disk image formatted with both ext2 and FAT at once☆384Updated 2 years ago
- ☆79Updated 3 years ago
- XOR cat - a command line tool to XOR a data stream with a given key☆35Updated 12 years ago
- Proof-of-concept for Spook.js☆70Updated 4 years ago
- Cryptonita - cryptanalysis swiss army knife☆14Updated 8 months ago
- Seer is a tool that recognizes the architecture of a binary file☆102Updated 3 years ago
- C Compiler which targets Excel (MS Office)☆288Updated 5 years ago
- Attempts at fuzzing Python unpicklers☆39Updated last year
- Some files with nasty names☆46Updated 7 years ago
- ☆112Updated 2 years ago
- ☆166Updated 7 years ago
- A binary visualization tool to aid with reverse engineering and malware detection similar to Cantor.Dust☆131Updated 3 years ago