farjump / fwtr
Open Database of Firmware Test Results
☆150Updated 8 years ago
Alternatives and similar repositories for fwtr:
Users that are interested in fwtr are comparing it to the libraries listed below
- netcat that takes unfair advantage of traffic shaping systems that don't initially ratelimit☆2Updated 4 years ago
- Pretty Curved Privacy☆122Updated 7 years ago
- chkboot is a tool to help detect changes to an unencrypted /boot partition.☆144Updated 4 years ago
- ☆286Updated 8 years ago
- A public database for software and firmware hashes☆214Updated 8 years ago
- A set of PS4 experiments using the WebKit exploit☆83Updated 9 years ago
- ☆360Updated 3 weeks ago
- URL Shortener built on top of WAFer☆183Updated 8 years ago
- tap curl in your editor before it gets to sh it☆87Updated 8 years ago
- psdoom-ng is a First Person Shooter operating system process killer based on psDooM and Chocolate Doom.☆48Updated 10 years ago
- Von Neumann Defense Force☆120Updated 8 years ago
- Give pact several PIDs. When one PID dies, pact will kill all provided PIDs.☆190Updated 9 years ago
- Transform your PC into a Raspberry Pi☆152Updated 10 years ago
- A Password hash storage scheme that prevents an attacker from cracking passwords individually and efficiently.☆323Updated 7 years ago
- ☆144Updated 8 years ago
- Removes all "Social DRM" from booXtream ePub files☆185Updated 6 years ago
- ☆47Updated 4 years ago
- Inline C/asm in Bash☆252Updated 7 years ago
- Tools and ideas to help with PGP keys and fingerprint verification☆58Updated last year
- a simple, fully featured command line note taking tool written in Rust☆358Updated 7 years ago
- The "Intel x86 considered harmful" paper☆196Updated 9 years ago
- A tool for manipulating X windows☆353Updated 4 years ago
- Edit commit messages, authors, and timestamps during git-rebase☆203Updated 7 years ago
- SC4 - Strong Crypto for Mere Mortals☆122Updated 3 years ago
- Secure file archiver☆246Updated 8 years ago
- state machine visual debugger☆121Updated 10 years ago
- SWC USB Adapter☆123Updated 6 years ago
- PGP-like encryption + torrent-like addressing + blockchain-like enforcement of data expiry☆123Updated 7 years ago
- Koszek-Matyja Network Simulator. Specify network architecture in a simple configuration file and run network simulations.☆59Updated 9 years ago
- Example of CPU simulation in software☆158Updated 9 years ago