javirk / Wormhole-simulationLinks
Simulation of a wormhole without gravity using ray tracing under curved lines.
☆18Updated 4 years ago
Alternatives and similar repositories for Wormhole-simulation
Users that are interested in Wormhole-simulation are comparing it to the libraries listed below
Sorting:
- A repository of CAD files for 3D printable optical components.☆19Updated 7 years ago
- talking LED mask for BSides 2020 presenters☆22Updated 4 years ago
- Upload external IP so you can find your devices elsewhere☆16Updated last year
- Low cost ventilator based on Dr. Jeffrey Ebin's design☆21Updated 5 years ago
- Sample code for locating Particle Photons on your local network for direct client-server communication☆11Updated 9 years ago
- Learning about disassembling☆20Updated 6 years ago
- Utility to glitch and dump an AirTag☆168Updated 4 years ago
- Hijacks Twitter Accounts and Automates Sending to Bitcoin Address: bc1qxy2kgdygjrsqtzq2n0yrf2493p83kkfjhx0wlh☆50Updated 3 years ago
- A possible method for faster-than-light communication☆43Updated last year
- ☆33Updated 7 years ago
- How fast can we brute force a 64-bit comparison?☆54Updated 5 years ago
- ☆30Updated 3 years ago
- General scripts☆32Updated 7 years ago
- Audible Electromagnetic Interference Detector - Model ET-1☆14Updated 5 years ago
- Quantitative analysis of location reports from Apple's offline finding (OF) location tracking system☆10Updated 4 years ago
- GPU rootkit PoC by Team Jellyfish☆100Updated 10 years ago
- ☆33Updated 3 years ago
- Code for the WWW'20 paper "Nowhere to Hide: Cross-modal Identity Leakage between Biometrics and Devices"☆22Updated 2 years ago
- A binary visualization tool to aid with reverse engineering and malware detection similar to Cantor.Dust☆131Updated 3 years ago
- Browser agnostic extension that enables pasting into password fields...☆15Updated 5 years ago
- Platform independent Near Field Communication (NFC) library☆28Updated 4 years ago
- ☆17Updated 3 years ago
- 🧠 🔎 🤖 Kitsune is an artificial neural network designed to detect and correlate Twitter profiles with similar behaviours.☆244Updated 3 years ago
- Public specifications for easy accessibility☆21Updated 4 years ago
- Collection of legal threats against good faith Security Researchers; vulnerability disclosure gone wrong. A continuation of work started …☆310Updated 10 months ago
- Quick utility to craft executables for pentesting and managing reverse shells☆43Updated 6 years ago
- Visualise atomic and molecular system structures and trajectories☆13Updated last month
- My undergraduate thesis☆22Updated 4 years ago
- Open rTMS (Transcranial Magnetic Stimulation)☆30Updated 4 years ago
- PageBuster - dump all executable pages of packed processes.☆204Updated 4 years ago