Detect common mistakes in academic papers
☆61Mar 1, 2019Updated 7 years ago
Alternatives and similar repositories for Chrisper
Users that are interested in Chrisper are comparing it to the libraries listed below
Sorting:
- ☆23Aug 30, 2025Updated 6 months ago
- A simple program that calculates a checksum over its own executable program memory☆12Mar 12, 2017Updated 8 years ago
- print all the the "push" times for commits to GitHub☆16May 22, 2019Updated 6 years ago
- Winner of LA Hack's Award Best Use of Wolfram Tech 🎉 An AI system to determine if a given statement is true or false.☆18Feb 11, 2019Updated 7 years ago
- ELF header abuse☆50Mar 23, 2016Updated 9 years ago
- ☆28Feb 14, 2018Updated 8 years ago
- A simple python library that makes creation of threads easier. It makes functions asynchronous with only one extra line of code.☆21Apr 7, 2019Updated 6 years ago
- Agrigento is a tool to identify privacy leaks in Android apps by performing black-box differential analysis on the network traffic.☆72Oct 1, 2020Updated 5 years ago
- Simplicity and high performance for managing microservices☆18Feb 25, 2023Updated 3 years ago
- The CloudProxy Tao for Trustworthy Computing☆37Aug 30, 2017Updated 8 years ago
- ☆11Jan 12, 2020Updated 6 years ago
- Compartmentalization using hardware and software techniques.☆12Aug 28, 2025Updated 6 months ago
- Python FileSystem Grapher - creates beautiful graphs of your filesystem or process tree☆31Jan 12, 2022Updated 4 years ago
- Cryptris, a game about asymmetric cryptography☆18Sep 6, 2014Updated 11 years ago
- glFTPd binary logs utility☆14Aug 19, 2025Updated 6 months ago
- A quick LKM rootkit that executes a reverse TCP netcat shell with root privileges.☆41Jun 8, 2018Updated 7 years ago
- Organization's website☆10Jul 5, 2024Updated last year
- Alsa and tinyalsa plugins for the parameter-framework☆11Mar 30, 2017Updated 8 years ago
- Mosquitto (mqtt) authentication and ACL (Access control list) checking plugin. It is working based on MYSQL database.☆12Aug 28, 2025Updated 6 months ago
- Keyctl CAAM Security☆15Dec 15, 2025Updated 2 months ago
- A private tracker middleware for the chihaya BitTorrent tracker☆10Aug 17, 2019Updated 6 years ago
- A library of fast s-t graph cut algorithms for Python.☆11Feb 9, 2024Updated 2 years ago
- BroadBand Simulator (v2)☆11Feb 18, 2026Updated 2 weeks ago
- Simple web applications for the AGL platform.☆12Jun 17, 2022Updated 3 years ago
- Tooll for sql injections scan☆11Jul 17, 2018Updated 7 years ago
- Settings application☆12Sep 6, 2023Updated 2 years ago
- 🛠️ Tool to bypass my school's security system to get sudo privileges on MacOS☆41Jan 22, 2020Updated 6 years ago
- cgi program for the haunted webring☆10Jul 8, 2023Updated 2 years ago
- Modified version of QPBO algorithm by Vladimir Kolmogorov for very large graphs.☆11Dec 14, 2018Updated 7 years ago
- L'application pour bloquer un paquet, snipping, analyser le réseau☆11Dec 23, 2016Updated 9 years ago
- A GitHub action to run hadolint and reports violations given a Dockerfile within a repository☆13Feb 23, 2024Updated 2 years ago
- QEMU bare metal test for validating TrustZone support☆11Apr 23, 2015Updated 10 years ago
- Wipe or locate Android device on receipt of signed SMS☆12Jun 15, 2016Updated 9 years ago
- ZAST Express: Your Security Copilot in IDE.☆27Nov 28, 2025Updated 3 months ago
- LockJar manages Java Jars for Ruby☆45May 4, 2016Updated 9 years ago
- Clippy is your friend. A very helpful friend.☆15Feb 27, 2026Updated last week
- ☆16Jul 25, 2022Updated 3 years ago
- Auxiliary variable Markov chain Monte Carlo methods☆10Oct 24, 2017Updated 8 years ago
- Watering system, developed over a ESP8266 NodeMCU v3 (works with any ESP8266). It has soil sensor, wifi connection, RTC and SD-Card☆14Sep 24, 2017Updated 8 years ago