igorvanloo / Project-Euler-Explained
Project Euler Explained, codes used to solve Project Euler problems
☆9Updated this week
Alternatives and similar repositories for Project-Euler-Explained:
Users that are interested in Project-Euler-Explained are comparing it to the libraries listed below
- Warning! Don't run this code on your computer.☆15Updated 5 years ago
- Othello program created by Gunnar Andersson - This is a copy of the original code -☆14Updated 10 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆14Updated 2 years ago
- ☆9Updated last year
- Solutions to https://cryptopals.com problems☆26Updated last year
- ☆38Updated 10 months ago
- Games and exercises to learn about browsers and security☆11Updated 5 months ago
- A curated collection of scripts for kernel-related devops☆14Updated last year
- Cryptanalysis and attack library☆22Updated 2 years ago
- Upload external IP so you can find your devices elsewhere☆15Updated 10 months ago
- My personal tech blog☆15Updated 2 months ago
- ☆35Updated 10 months ago
- Static analysis tool that can identify potential ransomware on PE or ELF files based on heuristics☆16Updated last year
- The autoexpect of pwntools☆18Updated 6 years ago
- Data graphing library for command line.☆15Updated 3 years ago
- Bulk delete Tweets you have liked on Twitter!☆13Updated last year
- blog☆11Updated 3 weeks ago
- The pattern matching swiss knife☆15Updated 5 years ago
- An official Rizin package manager☆20Updated 2 months ago
- Imported from svn://scm.gforge.inria.fr/svnroot/ecm/☆23Updated last year
- A mirror of the Valgrind library source code (version 3.13.0). This is NOT the official Valgrind source, please find official source at h…☆17Updated last year
- A C++, header-only DID:x509 resolver☆14Updated 6 months ago
- encrypted-linux-kernel-modules☆12Updated 4 years ago
- Python interface for ADT Pulse security systems☆15Updated last month
- A repository for maintaining a list of the top domains based on multiple lists☆21Updated 2 years ago
- ☆8Updated 2 years ago
- Hook for the PoC for exploiting CVE-2024-32002☆15Updated 9 months ago
- Some stuff about telecom security☆14Updated 9 years ago
- An SSH honeypot written entirely in Go.☆13Updated last month
- A set of Python tools useful for cryptography and cryptanalysis.☆15Updated 8 years ago