A framework for BREACH and other compression-based crypto attacks
☆14Dec 7, 2017Updated 8 years ago
Alternatives and similar repositories for rupture
Users that are interested in rupture are comparing it to the libraries listed below
Sorting:
- A framework for BREACH and other compression-based crypto attacks☆236Feb 11, 2020Updated 6 years ago
- Gandr is a cross-platform bootloader project, intended to fill in the gap of a utopic bootloader.☆20Aug 13, 2015Updated 10 years ago
- This's a translation edition of Beej's Guide Network Programming in Chinese which translated by Michael Yuanyuan☆14Apr 15, 2013Updated 12 years ago
- fuzz testing framework for Linux system calls☆12Sep 4, 2015Updated 10 years ago
- A collection of hardware Trojans (HTs) automatically generated by Large Language Models (GPT-4, Gemini-1.5-pro, and LLaMA3) targeting SRA…☆11Oct 8, 2025Updated 4 months ago
- Multum In Parvo Operating System is a cooperative multitasking RTOS designed for single-chip micro-controllers with severely limited RAM …☆11Jun 3, 2024Updated last year
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 5 years ago
- extremely simple MTA to get mail off the system to a mail hub☆14Oct 31, 2013Updated 12 years ago
- Decoupled AI copilot for pentesting & CTFs. Sidecar tails your shell history, parses tool outputs, grounds suggestions in your notes, and…☆13Nov 21, 2025Updated 3 months ago
- A full example report☆11Jul 23, 2019Updated 6 years ago
- dthreads: Efficient Deterministic Multithreading☆20Sep 24, 2015Updated 10 years ago
- Haskell book exercises - http://haskellbook.com/☆11Dec 26, 2018Updated 7 years ago
- Capstone disassembly/disassembler framework: Core (Arm, Arm64, Mips, PPC, Sparc, SystemZ, X86, X86_64, XCore) + bindings (Python, Java, O…☆11Jul 3, 2018Updated 7 years ago
- Fortune cookie app for Flipper Zero☆16Nov 5, 2024Updated last year
- Continuum Dynamics Evaluation and Test Suite☆15Aug 29, 2017Updated 8 years ago
- Single header only, asynchronous observer structure. Connection is broken when subject or subscriber gets out of scope. Connection itself…☆11Nov 9, 2021Updated 4 years ago
- A repo to share idea on customize a machine for the use of vim.☆13May 7, 2020Updated 5 years ago
- Crappy shell script that port scans using curl☆13May 3, 2017Updated 8 years ago
- Prolog list utility predicates☆11Jul 19, 2018Updated 7 years ago
- A curated list of Workflow Automation Software, Engines and Tools☆38Dec 20, 2025Updated 2 months ago
- littleoldearthquake☆12Jul 15, 2014Updated 11 years ago
- ☆24Updated this week
- NumPy aware dynamic Python compiler using LLVM☆12Nov 7, 2024Updated last year
- simple charting tools for unix.☆28Oct 22, 2015Updated 10 years ago
- ☆13Jan 8, 2021Updated 5 years ago
- Dirty Cow implement in Go☆11Nov 3, 2016Updated 9 years ago
- LaTeX source code for new Networking Textbook☆13Feb 16, 2022Updated 4 years ago
- ☆13May 23, 2024Updated last year
- AD concepts, attack surfaces and attack vectors notes, slides, video...☆16Dec 6, 2024Updated last year
- Binary analysis. Capstone+Keystone+Unicorn = static and dynamic binary analysis☆12Oct 11, 2019Updated 6 years ago
- Go wrapper for Google's ortools☆10Nov 29, 2017Updated 8 years ago
- A minimum client for Draw Things API☆16Feb 11, 2024Updated 2 years ago
- An application to simulate Tomasulo's algorithm☆11Jan 16, 2014Updated 12 years ago
- Using MCP is fun with Cyberbro!☆19Jan 27, 2026Updated last month
- Exploit for Microsoft SharePoint 2019☆13Dec 28, 2023Updated 2 years ago
- Powerful advanced web platform for C2 managing and automated penetration testing.☆15Jun 30, 2023Updated 2 years ago
- Canonical repo☆16Feb 26, 2019Updated 7 years ago
- Efficient union and equivalence testing of sets.☆31Jan 29, 2019Updated 7 years ago
- A proof of concept for obfuscating an x86_64 ELF executable without binary lifting. Done as a challenge project.☆18Feb 12, 2019Updated 7 years ago