jedisct1 / byteripper
A tool to extract code from individual functions in a library.
☆16Updated 4 months ago
Alternatives and similar repositories for byteripper:
Users that are interested in byteripper are comparing it to the libraries listed below
- A DNS library for Rust.☆23Updated 2 weeks ago
- A deceptively simple way to add a configuration file to a command-line application.☆16Updated last month
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆15Updated 8 years ago
- Pong revolution.☆13Updated 5 years ago
- System tracer implementation in Rust☆32Updated 8 years ago
- AppSecurityLimits - Allows Executables To Define Security Limits☆17Updated 5 years ago
- A space-optimized binary tree for storing IP addresses☆13Updated 8 years ago
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Updated 4 years ago
- ☆16Updated 7 years ago
- A tool / library for simplifying string obfuscation with xor.☆22Updated 9 months ago
- A packet-sniffer for 10gig networks that writes to compressed files. I created this because☆27Updated 7 years ago
- Private Internet Access - Windows TAP adapter for Desktop VPN Client☆12Updated 5 years ago
- AVX2 Chacha implementation☆16Updated 11 years ago
- A simple implementation of an 'echo' (port 7) server using epoll (Linux), kqueue (FreeBSD), and IOCompletionPorts (Windows).☆13Updated 6 years ago
- ipcipher is a specification for encrypting IP{v4,v6} addresses 'in place'.☆19Updated 7 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆48Updated 4 years ago
- The Secure Block Device Library is a software library that applies cryptographic confidentiality and integrity protection, including data…☆36Updated 7 years ago
- ld_preload userland rootkit☆34Updated 4 years ago
- Plug-and-play IP rate limiter in C☆24Updated 4 years ago
- An overlay that verifies signed ELF binaries☆9Updated 10 years ago
- Sample showing the use of CoGetInterceptor☆21Updated 4 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- proxyd proxies data between TCP, TLS, and unix sockets☆18Updated 7 years ago
- A simple proof of work, mainly designed to mitigate DDoS attacks.☆25Updated 4 years ago
- Random notes I want to backup.☆18Updated 2 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 7 years ago
- Test Suite for John the Ripper☆24Updated 3 years ago
- A collection of all the court filings in the case of Apple being forced to help the FBI unlock the San Bernadino shooter's phone, plus so…☆11Updated 9 years ago
- Library and tools to access the GUID Partition Table (GPT) volume system format☆10Updated 8 months ago
- Library to support cross-platform AES encryption☆12Updated 6 months ago