daeken / wash
Wolfram Alpha shell
☆14Updated 9 years ago
Alternatives and similar repositories for wash:
Users that are interested in wash are comparing it to the libraries listed below
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago
- Grab files matching a search specification from Github☆110Updated 4 years ago
- Run basic functions from stripped binaries cross platform☆111Updated 8 years ago
- A weekly challenge where we share some code and you find a bug in it.☆71Updated 9 years ago
- Multiple radare2 rpipe scripts☆61Updated 7 years ago
- Basic command line, text-based, shellcode debugger.☆92Updated 7 years ago
- Collection of somewhat useful stuff for CTF events☆36Updated 9 years ago
- IDA plugin for software reverse-engineering and visualization.☆7Updated 9 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- Password manager for USB Armory☆36Updated 9 years ago
- ☆48Updated 9 years ago
- My little fuzzing framework inspired by grinder☆99Updated 7 years ago
- ☆159Updated 10 years ago
- A terminal-based programmer's calculator endowed with unholy acting talent by the Robot Devil☆87Updated last year
- Thought experiment / prototype that performs random Google searches, clicks to increase privacy☆96Updated 8 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆53Updated 7 years ago
- ☆30Updated 10 years ago
- Hazmat ECC arithmetic for Cryptography.io☆28Updated 5 years ago
- Statically linked Library detector☆70Updated 10 years ago
- Alternative hexdump.☆15Updated 9 years ago
- Chair and the Key☆65Updated 9 years ago
- free crypto audit☆31Updated 8 years ago
- A OS X crypto ransomware PoC☆87Updated 9 years ago
- HTTP framework☆48Updated 7 years ago
- Stock photo assets of real hackers☆15Updated 8 years ago
- Tor Browser and Tails version fingerprint PoC☆136Updated 6 years ago
- A collection of steganography tools.☆15Updated 4 years ago
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Updated 9 years ago
- ☆55Updated 9 years ago