Pieter Wuille's reference implementation for Bech32 and segwit addresses
☆20Feb 17, 2020Updated 6 years ago
Alternatives and similar repositories for bech32
Users that are interested in bech32 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Microsoft 365 Lighthouse Business Intelligence☆13Jul 21, 2021Updated 4 years ago
- POC for CVE-2023-29360☆12Aug 31, 2024Updated last year
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- Some stuff for PHD2021☆14May 21, 2025Updated 10 months ago
- Example of an ELF parser to learn about the ELF format☆11Oct 6, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Multitool for Windows native find + replace bytes in hex format☆18Jan 22, 2026Updated 2 months ago
- ☆10Jun 9, 2021Updated 4 years ago
- ☆13Jun 26, 2021Updated 4 years ago
- An example of an external LLVM plugin module transform pass for the latest versions.☆15Oct 21, 2025Updated 5 months ago
- Read ETW Provider events. Inspired by ETWExplorer by Pavel Yosifovich☆18Jun 29, 2024Updated last year
- Heappo 🦛 is a PyKD based extensions for WinDBG which aids Heap Exploitation☆14Mar 25, 2020Updated 6 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆14Mar 3, 2019Updated 7 years ago
- Quick test for CVE-2023-26025 behaviours☆13Nov 29, 2023Updated 2 years ago
- Auditing Hooks for https://github.com/jborean93/PSDetour☆13Mar 25, 2026Updated 3 weeks ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A library for working with NTFS Reparse Points☆23Sep 6, 2019Updated 6 years ago
- A critical RCE vulnerability in Windows TCP/IP stack (CVE-2025-26686) leaves sensitive memory unlocked, allowing remote attackers to hija…☆32Sep 16, 2025Updated 7 months ago
- ☆15Aug 12, 2024Updated last year
- C# / .NET version of CVE-2023-21768☆14Sep 6, 2024Updated last year
- ☆10Apr 24, 2020Updated 5 years ago
- ☆11Apr 30, 2021Updated 4 years ago
- version 0.5.8☆18Jul 13, 2021Updated 4 years ago
- A set of tools and exploits to cause DoS for remote Windows Server & Windows 11 machines☆32Feb 9, 2026Updated 2 months ago
- A solution to create obfuscated download cradles for PowerShell.☆16Aug 1, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- NailaoLoader: Hiding Execution Flow via Patching☆23Feb 27, 2025Updated last year
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆18Oct 28, 2023Updated 2 years ago
- ☆24Jan 27, 2026Updated 2 months ago
- Yet another awesome fuzzers list☆15Oct 25, 2024Updated last year
- ☆17Jun 1, 2024Updated last year
- ☆20Nov 8, 2020Updated 5 years ago
- Identifies metadata of .NET binary files.☆21Apr 3, 2024Updated 2 years ago
- ☆14Jul 29, 2024Updated last year
- Unpacker for donut shellcode☆21Jun 20, 2020Updated 5 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆25Jan 6, 2025Updated last year
- CVE-2023-21823 PoC☆14Apr 20, 2023Updated 2 years ago
- Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability☆24Feb 5, 2025Updated last year
- A simple UEFI bootkit made by @NSG650 and me.☆26Dec 29, 2024Updated last year
- Automatically exported from code.google.com/p/idapython☆21Apr 14, 2015Updated 11 years ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Sep 26, 2025Updated 6 months ago
- Persistent through COM Hijacking☆22Jan 15, 2019Updated 7 years ago