jd / lwn2pocketLinks
Push LWN.net Weekly Edition to Pocket
☆14Updated 4 years ago
Alternatives and similar repositories for lwn2pocket
Users that are interested in lwn2pocket are comparing it to the libraries listed below
Sorting:
- ☆27Updated 8 years ago
- The "Intel x86 considered harmful" paper☆200Updated 9 years ago
- The engine that powers DeLorean!☆837Updated 6 years ago
- Bridge for LIFX and WeMo Link LED bulbs to an Amazon Echo compatible Hue interface☆28Updated 9 years ago
- IP Over QR Code Tunnel☆199Updated 9 years ago
- rip meta-tags from iTunes database☆30Updated 9 years ago
- Scripts, learnings, sample configurations, and random whining☆150Updated 10 years ago
- Hackers in yo' kernel!☆59Updated 10 years ago
- Inline C/asm in Bash☆253Updated 8 years ago
- Visual reverse engineering tool. Veles is better, use it. Don't use this.☆591Updated 4 years ago
- Dynamic Visual Debugging / Reverse Engineering Toolsuite☆251Updated 6 years ago
- Easily retargetable and hackable interactive disassembler with IDAPython-compatible plugin API☆411Updated 5 years ago
- chkboot is a tool to help detect changes to an unencrypted /boot partition.☆151Updated 4 years ago
- Open Database of Firmware Test Results☆151Updated 9 years ago
- CJAG is an open-source implementation of our cache-based jamming agreement.☆284Updated 3 years ago
- Removes all "Social DRM" from booXtream ePub files☆186Updated 7 years ago
- Brainfuck Key Derivation Function☆30Updated 10 years ago
- A program to send Ethernet PAUSE frames☆36Updated 9 years ago
- Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.☆275Updated 10 years ago
- Raspberry Pi 2 bootloader for starting the cores in HYP mode☆31Updated 10 years ago
- uclibc build environment for predictable and repeatable building of binary packages☆56Updated 8 years ago
- The USG is Good, not Bad☆400Updated 5 years ago
- The "State considered harmful" paper☆109Updated 9 years ago
- Boot a Linux kernel in a VM without a dedicated root filesystem.☆122Updated 4 months ago
- Check whether AMT is enabled and provisioned under Linux☆475Updated 7 years ago
- Experimental app for visualizing wifi packet captures☆25Updated 7 years ago
- The DrK Attack - Proof of concept☆347Updated 3 years ago
- Encode any IP address as a haiku, funny and lovely. TRY IT NOW: http://pyhipku.lord63.com☆91Updated 3 years ago
- An easy-to-use network impairment script for Linux written in Python☆257Updated 2 years ago
- Simple Driver code for vmlaunch☆160Updated 8 years ago