farjump / fwtrLinks
Open Database of Firmware Test Results
☆150Updated 9 years ago
Alternatives and similar repositories for fwtr
Users that are interested in fwtr are comparing it to the libraries listed below
Sorting:
- chkboot is a tool to help detect changes to an unencrypted /boot partition.☆151Updated 4 years ago
- ☆288Updated 9 years ago
- Pretty Curved Privacy☆122Updated 8 years ago
- A public database for software and firmware hashes☆214Updated 8 years ago
- Removes all "Social DRM" from booXtream ePub files☆184Updated 7 years ago
- Inline C/asm in Bash☆252Updated 8 years ago
- A set of PS4 experiments using the WebKit exploit☆83Updated 9 years ago
- ☆359Updated 6 months ago
- A Password hash storage scheme that prevents an attacker from cracking passwords individually and efficiently.☆320Updated 8 years ago
- Tools and ideas to help with PGP keys and fingerprint verification☆57Updated last year
- Keeping notes throughout my learnings.☆73Updated 3 months ago
- ☆144Updated 9 years ago
- The "Intel x86 considered harmful" paper☆199Updated 9 years ago
- Educational SSH client☆124Updated 9 years ago
- Hackers in yo' kernel!☆59Updated 10 years ago
- psdoom-ng is a First Person Shooter operating system process killer based on psDooM and Chocolate Doom.☆48Updated 11 years ago
- SC4 - Strong Crypto for Mere Mortals☆122Updated 4 years ago
- Give pact several PIDs. When one PID dies, pact will kill all provided PIDs.☆190Updated 9 years ago
- System Architecture Mapper☆174Updated 8 years ago
- Wireshark-Specific Dissector Language☆198Updated 8 years ago
- Cross-platform GUI for the Tarsnap backup service.☆255Updated 11 months ago
- simple static site generator☆35Updated 3 years ago
- Koszek-Matyja Network Simulator. Specify network architecture in a simple configuration file and run network simulations.☆59Updated 9 years ago
- Example of CPU simulation in software☆159Updated 9 years ago
- Transform your PC into a Raspberry Pi☆152Updated 10 years ago
- An AI/bot for 0 A.D.☆168Updated 8 years ago
- Next-generation bcrypt, scrypt, pbkdf2☆114Updated 10 years ago
- IP Over QR Code Tunnel☆199Updated 8 years ago
- PGP-like encryption + torrent-like addressing + blockchain-like enforcement of data expiry☆122Updated 8 years ago
- ☆115Updated 9 years ago