abudnik / primesLinks
Algorithm for finding all prime numbers up to any given limit
☆0Updated 8 years ago
Alternatives and similar repositories for primes
Users that are interested in primes are comparing it to the libraries listed below
Sorting:
- Ontological counterpart to whoami that explains the meaning of life.☆24Updated 7 years ago
- a simple Makefile template for small-medium C/C++ projects☆13Updated 8 years ago
- ASM Malicious code - PE infector☆71Updated 8 years ago
- Tools for attacking cryptographic implementations.☆21Updated 8 years ago
- Anonymous web chat server, built on top of Themis/WebThemis☆106Updated 9 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 7 years ago
- ☆8Updated 11 years ago
- Detect some forms of linux kernel tampering☆12Updated 10 years ago
- CTF Writeups☆10Updated 8 years ago
- See my shmoocon talk repo for updated code:☆25Updated 11 years ago
- Showing entropy analysis examples for different data types. example.sh was used to generate. It utilizes cyphunks libdisorder branch and …☆12Updated 10 years ago
- A Prime Number Algorithm by E. W. Dijkstra☆15Updated 4 years ago
- Shellcodes for different usecases☆9Updated 8 years ago
- tests to see if your internal network is susceptible to MiM attacks. do not use on networks you do not own.☆15Updated 9 years ago
- Store arbitrary files inside PNGs to overcome nonsensical file type restrictions☆30Updated 8 years ago
- Project for the Crypto subject at Uni☆18Updated 8 years ago
- Kudelski Security's 2017 crypto challenge☆20Updated 7 years ago
- Cryptography: a proof-of-concept attack against the MAC-then-encrypt scheme☆7Updated 10 years ago
- ☆17Updated 7 years ago
- [Retired] Hardened Paste is a browser extension that prevents the “pastejacking” exploit.☆30Updated 7 years ago
- Raspberry pi fullscreen monitor.☆9Updated 8 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51Updated 9 years ago
- ☆20Updated 8 years ago
- Continuous bitcoin-inspired capture-the-flag challenge. (Alpha)☆56Updated 9 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- My solutions to Matasano Cryptopals challenge.☆30Updated 10 years ago
- A library to get images from social media☆15Updated 8 years ago
- Visual Interface heXadecimal dump☆52Updated 8 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago