abudnik / primesLinks
Algorithm for finding all prime numbers up to any given limit
☆0Updated 8 years ago
Alternatives and similar repositories for primes
Users that are interested in primes are comparing it to the libraries listed below
Sorting:
- a simple Makefile template for small-medium C/C++ projects☆13Updated 9 years ago
- Tic Tac Toe CLI game written in C++.☆19Updated 6 years ago
- CTF Writeups☆10Updated 8 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Updated 10 years ago
- A complete refactor and different take on a traditional attack script for exploiting XML-RPC pingback(s) on WordPress.☆29Updated 8 years ago
- A kernel module that lists all current tasks in a Linux system☆14Updated 9 years ago
- Nohidy the system admins best friend, multi platform auditing tool☆14Updated 7 years ago
- A backdoor socket that takes commands from a client and executes them in the server machine☆9Updated 8 years ago
- Detect some forms of linux kernel tampering☆12Updated 10 years ago
- Berliner Spargel OS☆12Updated 11 years ago
- 2 Linux Kernel Modules for Listing Tasks. The first iterates over the tasks linearly and the second iterates over the tasks with a depth-…☆14Updated 4 years ago
- A tiny ELF.☆25Updated 5 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Updated 8 years ago
- ASM Malicious code - PE infector☆72Updated 8 years ago
- Open source reverse-engineering tool, mainly targeted towards embedded systems☆21Updated 15 years ago
- A collection of steganography tools.☆15Updated 4 years ago
- Showing entropy analysis examples for different data types. example.sh was used to generate. It utilizes cyphunks libdisorder branch and …☆13Updated 10 years ago
- A (very basic) steganographic device, for encoding a payload into an image☆24Updated 9 years ago
- Packet Knock-Out is an exploration in a method of data exfiltration via packet port numbers.☆14Updated 8 years ago
- Create shellcode from executable or assembly code☆12Updated 8 years ago
- Check for HTTP Security Headers☆14Updated 9 years ago
- Utility to manipulate SDBM files used by ModSecurity. With that utility it is possible to _shrink_ SDBM databases. It is also possible to…☆22Updated 11 months ago
- This python program Encrypts everything with AES 256 bit algorithm.☆23Updated 8 years ago
- Learning a bit of assembly programming☆13Updated 10 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- Tools and library to manipulate EFI variables.☆11Updated last month
- You'll never take me alive.☆86Updated 11 years ago
- A collection of crackmes☆40Updated 6 months ago
- Alternative hexdump.☆15Updated 9 years ago
- Cymric - Portable secure random number generator☆21Updated 11 years ago