Rogdham / gif-md5-hashquineLinks
GIF displaying its own MD5 (hashquine)
☆78Updated 5 years ago
Alternatives and similar repositories for gif-md5-hashquine
Users that are interested in gif-md5-hashquine are comparing it to the libraries listed below
Sorting:
- Intel Management Engine JTAG Proof of Concept☆145Updated 5 years ago
- IPv4 address turf war!☆71Updated 2 years ago
- ☆111Updated 2 years ago
- A possible method for faster-than-light communication☆43Updated last year
- ☆129Updated 3 years ago
- Minimal RarVM Toolchain☆236Updated 10 years ago
- Get rickrolled, right in your favourite NSA reverse engineering tool☆77Updated 2 years ago
- Proof-of-concept for Spook.js☆70Updated 4 years ago
- XZ backdoor reverse engineering☆98Updated last year
- Tool for decrypting the firmware files for Samsung SSDs☆225Updated 4 years ago
- ☆115Updated 2 years ago
- Infer internal state of Mersenne Twister from truncated output☆76Updated 3 years ago
- Attack code for UHEPRNG (Ultra High Entropy Pseudo-Random Number Generator)☆11Updated 7 years ago
- Bad Apple, but 🌙☆44Updated 5 years ago
- render sprites into your desktop environment as shaped windows using GTK☆21Updated 4 years ago
- ☆112Updated 2 years ago
- lovense hush buttplug exploit chain☆219Updated 6 years ago
- Program for extracting TLS keys from Oculus Runtime☆53Updated 5 years ago
- Modify a message to have a desired CRC signature.☆124Updated 4 years ago
- Seer is a tool that recognizes the architecture of a binary file☆102Updated 3 years ago
- I hacked Minesweeper into putting flags on all the mined squares when starting. Yoohoo.☆66Updated 7 years ago
- A Python program implementing and exploiting the Minsky Turing machine considered in the paper "Intrinsic Propensity for Vulnerability in…☆78Updated 3 years ago
- ☆78Updated 4 years ago
- Source code of the paper "Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical"☆144Updated 4 years ago
- Download HK Propel (Human Kinetics) books in EPUB format☆24Updated 10 months ago
- Some files with nasty names☆46Updated 8 years ago
- A port of the awesome ASN.1 Javascript Decoder for GPG messages☆60Updated 2 years ago
- Factoring as a Service☆272Updated 4 months ago
- Hiding messages in x86 programs using semantic duals☆309Updated 2 weeks ago
- a simple script to simulate random "cosmic ray" memory errors against a linux process☆13Updated last year