Rogdham / gif-md5-hashquineLinks
GIF displaying its own MD5 (hashquine)
☆76Updated 5 years ago
Alternatives and similar repositories for gif-md5-hashquine
Users that are interested in gif-md5-hashquine are comparing it to the libraries listed below
Sorting:
- ☆129Updated 3 years ago
- A possible method for faster-than-light communication☆43Updated 2 years ago
- IPv4 address turf war!☆71Updated 2 years ago
- ☆113Updated 2 years ago
- Minimal RarVM Toolchain☆236Updated 10 years ago
- Make a disk image formatted with both ext2 and FAT at once☆384Updated 2 years ago
- Bad Apple, but 🌙☆45Updated 5 years ago
- Intel Management Engine JTAG Proof of Concept☆145Updated 5 years ago
- Linux netfilter module to toggle evil bit (RFC 3514) in all outgoing IPv4 packets☆28Updated 8 years ago
- ☆118Updated 2 years ago
- A backward-compatible subset of the PNG file format, for uncompressed bitmaps☆25Updated last year
- render sprites into your desktop environment as shaped windows using GTK☆22Updated 4 years ago
- Reads UTF-8 on stdin and prints out the raw Unicode codepoints. Useful for seeing exactly what a string consists of.☆64Updated 4 years ago
- The vim execution engine☆27Updated 7 years ago
- Modify a message to have a desired CRC signature.☆126Updated 4 years ago
- this URL is also malicious(?!) shell script☆144Updated 10 months ago
- Minesweeper based spam prevention☆13Updated 4 years ago
- Infer internal state of Mersenne Twister from truncated output☆77Updated 3 years ago
- Get rickrolled, right in your favourite NSA reverse engineering tool☆75Updated 2 years ago
- Seer is a tool that recognizes the architecture of a binary file☆102Updated 3 years ago
- About an old technology that still screws up some anti virus software☆141Updated 9 years ago
- ☆78Updated 4 years ago
- Tool for decrypting the firmware files for Samsung SSDs☆232Updated 4 years ago
- A simple tool for converting binary files into PNGs for posting on twitter☆62Updated 4 years ago
- ☆70Updated 2 years ago
- Linux i386 tool to load and execute ME modules.☆136Updated 4 years ago
- Proof-of-concept for Spook.js☆70Updated 4 years ago
- Architectural privilege escalation on x86☆61Updated 7 years ago
- A Python program implementing and exploiting the Minsky Turing machine considered in the paper "Intrinsic Propensity for Vulnerability in…☆78Updated 3 years ago
- ARM is Turing-complete without data fetches☆58Updated 7 years ago