igorvanloo / Project-Euler-ExplainedLinks
Project Euler Explained, codes used to solve Project Euler problems
☆15Updated 3 weeks ago
Alternatives and similar repositories for Project-Euler-Explained
Users that are interested in Project-Euler-Explained are comparing it to the libraries listed below
Sorting:
- Othello program created by Gunnar Andersson - This is a copy of the original code -☆16Updated 11 years ago
- ☆18Updated 2 years ago
- A tool to encode and decode content as whitespace☆18Updated 2 years ago
- Network Traffic Fuzzer☆17Updated last year
- ☆12Updated 2 years ago
- Solutions to https://cryptopals.com problems☆28Updated 9 months ago
- DC540 hacking challenge 0x00002 [MicroPython CTF].☆12Updated 2 months ago
- This repo includes the artifacts for the NDSS 2025 paper "Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China": h…☆50Updated 11 months ago
- Multi-language transpiler (source-to-source compiler) using AI☆26Updated 2 years ago
- ☆26Updated 4 years ago
- Pickle decompiler plugin for Radare2☆18Updated 2 years ago
- Demonstrates iterative FGSM on Apple's NeuralHash model.☆16Updated 4 years ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆27Updated 8 months ago
- Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1☆59Updated last year
- Minimal setup to trigger the xz backdoor☆29Updated last year
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Updated 4 years ago
- Cryptanalysis and attack library☆22Updated 3 years ago
- A utility to decrypt and retrieve encrypted data (either cookies or login credentials) from Chromium SQLite databases.☆12Updated 2 years ago
- Tool for profiling heap usage and memory management☆27Updated 4 years ago
- Upload external IP so you can find your devices elsewhere☆16Updated last year
- Security and Privacy Failures in Popular 2FA Apps☆19Updated 2 years ago
- ☆31Updated this week
- Custom Binary Ninja Themes☆12Updated 2 years ago
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆15Updated last year
- Introduction to Encryption☆12Updated 6 months ago
- A repository for maintaining a list of the top domains based on multiple lists☆23Updated 3 years ago
- excrypto offers specialized versions of the Go crypto, TLS, x509, and SSH packages designed for security research.☆15Updated last week
- The public release of LeftoverLocals code☆72Updated 2 weeks ago
- ☆24Updated 4 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Updated 2 years ago