abudnik / primes
Algorithm for finding all prime numbers up to any given limit
☆0Updated 8 years ago
Alternatives and similar repositories for primes:
Users that are interested in primes are comparing it to the libraries listed below
- Detect some forms of linux kernel tampering☆12Updated 9 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 8 years ago
- Generates a conversation word cloud from exported facebook chat logs☆17Updated 6 years ago
- A Prime Number Algorithm by E. W. Dijkstra☆15Updated 4 years ago
- Tic Tac Toe CLI game written in C++.☆19Updated 6 years ago
- Berliner Spargel OS☆12Updated 10 years ago
- Jericho Chat - Information-theoretically secure communications☆21Updated 3 months ago
- A C implementation of Spritz, a spongy RC4-like stream cipher and hash function.☆27Updated 9 years ago
- A *nix shell implemented in assembly - because why not?☆12Updated 8 years ago
- Full C Reference and Some Useful Topics.☆16Updated 7 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆44Updated 9 years ago
- ASM Malicious code - PE infector☆70Updated 7 years ago
- My solutions to Matasano Cryptopals challenge.☆30Updated 10 years ago
- A complete refactor and different take on a traditional attack script for exploiting XML-RPC pingback(s) on WordPress.☆29Updated 7 years ago
- A (very basic) steganographic device, for encoding a payload into an image☆24Updated 9 years ago
- Hohha Dynamic XOR Encryption Algorithm☆54Updated 5 years ago
- A small C library for matrix manipulation☆48Updated 6 years ago
- Lightweight cryptographic hash functions (reference code)☆16Updated 10 years ago
- You'll never take me alive.☆87Updated 10 years ago
- Tools and library to manipulate EFI variables.☆10Updated 7 months ago
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Updated last year
- A collection of steganography tools.☆15Updated 4 years ago
- ☆7Updated 10 years ago
- Shellcodes for different usecases☆9Updated 8 years ago
- Tools for attacking cryptographic implementations.☆21Updated 8 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- Vulnerable Linux socket game for educational purposes☆22Updated 7 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- ☆12Updated 8 years ago
- This project has been done with Chen as part of system security course at SBU CS.