igorvanloo / Project-Euler-Explained
Project Euler Explained, codes used to solve Project Euler problems
☆9Updated 8 months ago
Related projects ⓘ
Alternatives and complementary repositories for Project-Euler-Explained
- Automatic generator of YARA modules based in protocol buffers☆14Updated 2 months ago
- Demonstrates iterative FGSM on Apple's NeuralHash model.☆15Updated 3 years ago
- A wrapper around Windows, calls explicitly the lowest possible calls☆12Updated last year
- Cryptanalysis and attack library☆22Updated 2 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆12Updated 2 years ago
- A C++, header-only DID:x509 resolver☆14Updated 3 months ago
- Cyber security geoip attack map that follows syslog and parses IPs/port numbers to visualize attackers in real time.☆9Updated 4 years ago
- Master of Science in Cybersecurity, Sapienza University of Rome.☆44Updated last week
- Open YARA scan- and search engine☆17Updated last week
- Readline is a pure go(golang) implementation for GNU-Readline kind library☆13Updated 3 years ago
- Decryption utility for PGP Whole Disk Encryption☆18Updated 3 years ago
- Warning! Don't run this code on your computer.☆15Updated 5 years ago
- Generate CIA/NSA style project codenames☆23Updated 7 years ago
- Binary Ninja plugin for annotation of arguments for functions☆15Updated last month
- A fast port scanner written in go with a focus on reliability and simplicity.☆16Updated last month
- Generate representative samples from Pwned Passwords (HIBP)☆12Updated 2 years ago
- As I work thought the book "Practical Binary Analysis" by Dennis Andriesse, https://practicalbinaryanalysis.com/ I try to make editions f…☆11Updated 3 years ago
- Use a LLM to create the ultimate Leek AI for Leek Wars! 🥬☆12Updated 6 months ago
- Create an AMI with CobaltStrike and related tools.☆8Updated 3 months ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17Updated 3 years ago
- Static analysis tool that can identify potential ransomware on PE or ELF files based on heuristics☆14Updated 10 months ago
- Bulk delete Tweets you have liked on Twitter!☆11Updated last year
- Security and Privacy Failures in Popular 2FA Apps☆19Updated last year
- My personal tech blog☆15Updated last week
- Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1☆57Updated 5 months ago
- ☆23Updated 7 months ago
- Very simple cross-platform utility to manage your git identities.☆10Updated 2 years ago
- a tiny, wasm-ready virtual machine - stupidly fast☆38Updated last year