grocid / pigmentLinks
🎨 A tool program to set terminal colors from image
☆10Updated 8 years ago
Alternatives and similar repositories for pigment
Users that are interested in pigment are comparing it to the libraries listed below
Sorting:
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆61Updated 8 years ago
- Synesthesia, implemented as Yices scripts☆94Updated 8 years ago
- Writeups of CTF challenges I do☆13Updated 6 years ago
- ARM rop chain gadget searcher☆38Updated 8 years ago
- Collection of somewhat useful stuff for CTF events☆36Updated 10 years ago
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Updated 8 years ago
- ☆35Updated 13 years ago
- Code to fuzz bignum libraries☆46Updated 7 years ago
- Project for the Crypto subject at Uni☆18Updated 9 years ago
- Programmatic disassembly and patching☆69Updated 9 years ago
- SIGSTOPing ELF binaries since 0x7E1☆57Updated last year
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆34Updated 7 years ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Updated 7 years ago
- Simple application for playing with elliptic curves☆44Updated 3 years ago
- Block-based software vulnerability fuzzing framework☆49Updated 7 years ago
- an open source toolkit for PCI bus exploration☆72Updated 9 years ago
- NASM Standard Library for shellcode☆69Updated 9 years ago
- ☆38Updated 10 years ago
- ☆26Updated 7 years ago
- This repo holds materials for our Splash 2017 class on Z3.☆26Updated 8 years ago
- Kudelski Security's 2017 crypto challenge☆20Updated 8 years ago
- Our backup exploitation technique: fuzzing for POVs!☆24Updated 9 years ago
- Some RSA attacks with sage☆11Updated 9 years ago
- A program that automatically generates AFL-enabled builds of Debian packages.☆92Updated 5 years ago
- ☆49Updated 7 years ago
- ☆20Updated 6 years ago
- Memory awesomeness.☆29Updated 10 years ago
- CSAW CTF 2015 Linux kernel exploitation challenge☆37Updated 10 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆39Updated 8 years ago
- ☆15Updated 7 years ago