Public copy of webauth code
☆16Jul 21, 2022Updated 3 years ago
Alternatives and similar repositories for webauth
Users that are interested in webauth are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A handy string interpolator (C++11)☆15Aug 11, 2015Updated 10 years ago
- CSH Evals, the modern way.☆12Apr 2, 2026Updated last week
- Embeddable console 1bpp font that supports many european/eastern unicode codepoints. Aimed to gamedev (C++11).☆14May 15, 2015Updated 10 years ago
- An Unreal Engine 4 plugin for ELIAS.☆12Jul 27, 2015Updated 10 years ago
- ☆17Feb 24, 2025Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆15Dec 15, 2016Updated 9 years ago
- Cyber competition scoring engine☆17Jun 15, 2016Updated 9 years ago
- A tool to convert MIDI controller inputs into UDP packets☆18Sep 24, 2024Updated last year
- Tiny format/mustache templating library (C++11)☆24Jul 16, 2016Updated 9 years ago
- A PoC for CVE-2022-2588 that triggers a WARNING☆10Sep 28, 2022Updated 3 years ago
- A tool for secrets management, encryption as a service, and privileged access management☆12Jul 17, 2025Updated 8 months ago
- simple charting tools for unix.☆28Oct 22, 2015Updated 10 years ago
- C++ 3d math types for game developers☆21Feb 16, 2024Updated 2 years ago
- Konix Multisystem - Attack Of The Mutant Camels '89 V0.4 - Source Code☆24May 14, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Rust mantle experiments☆15Apr 18, 2015Updated 10 years ago
- PICO-8 cartridge downloader☆13Sep 26, 2017Updated 8 years ago
- Continuum Dynamics Evaluation and Test Suite☆15Aug 29, 2017Updated 8 years ago
- Knot is a lightweight and simple TCP networking C++ library with no dependencies.☆29Sep 10, 2015Updated 10 years ago
- Binary analysis. Capstone+Keystone+Unicorn = static and dynamic binary analysis☆12Oct 11, 2019Updated 6 years ago
- Speaker presentation slides☆22Apr 7, 2017Updated 9 years ago
- A lightweight packet capture application☆12Oct 16, 2014Updated 11 years ago
- POC for XStream RCE☆13Dec 23, 2013Updated 12 years ago
- A long, two-lines fish prompt theme☆13May 17, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Single header only, asynchronous observer structure. Connection is broken when subject or subscriber gets out of scope. Connection itself…☆11Nov 9, 2021Updated 4 years ago
- Auto-expand mentions of certain alias to their respective users, so you can ping groups of people all at once w/o pinging @channel or @gr…☆19May 29, 2016Updated 9 years ago
- dthreads: Efficient Deterministic Multithreading☆20Sep 24, 2015Updated 10 years ago
- Computer Security Class - Department of Informatics and Telecommunications, University of Athens☆12Feb 22, 2017Updated 9 years ago
- Extract cookies from Chrome, Chromium or Firefox sqlite cookie stores into a wget-compatible cookies.txt file☆19Feb 7, 2021Updated 5 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Aug 1, 2015Updated 10 years ago
- A proof of concept for obfuscating an x86_64 ELF executable without binary lifting. Done as a challenge project.☆18Feb 12, 2019Updated 7 years ago
- Meltdown and spectre explained -- for normal people☆10Sep 12, 2018Updated 7 years ago
- Text rendering utilities☆24Nov 19, 2018Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆19Jun 9, 2013Updated 12 years ago
- Examples of vulnerable PHP code☆12Feb 15, 2024Updated 2 years ago
- NumPy aware dynamic Python compiler using LLVM☆12Nov 7, 2024Updated last year
- Content Repository for Humanitarian/Free Open Source Software Development. Powered by Ofcourse.☆18Feb 21, 2020Updated 6 years ago
- library implementing asynchronous SSH connections☆29Oct 25, 2013Updated 12 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Mar 8, 2018Updated 8 years ago
- Efficient union and equivalence testing of sets.☆31Jan 29, 2019Updated 7 years ago