A few exercises from Zed Shaw’s “Learn C the Hard Way”
☆21Dec 16, 2019Updated 6 years ago
Alternatives and similar repositories for learn-c-the-hard-way
Users that are interested in learn-c-the-hard-way are comparing it to the libraries listed below
Sorting:
- Write Up I write for different CTFs☆12Nov 20, 2017Updated 8 years ago
- HackToday is annual ctf competition held by Cyber Security IPB☆17Mar 19, 2021Updated 4 years ago
- A collection of small hacks I wrote over the years☆36Feb 1, 2023Updated 3 years ago
- Files to build Docker image of Capture the Flags (CTF) game☆19Jan 25, 2018Updated 8 years ago
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Oct 31, 2017Updated 8 years ago
- Repository for Insomni'hack finals 2015☆22Mar 30, 2015Updated 10 years ago
- JSON-based FON (Feature Object Notation) format and tools to simplify genomic annotations usage☆13Jun 11, 2025Updated 8 months ago
- Samsung CTF 2017 Problems. https://sctf.codeground.org☆24Sep 3, 2018Updated 7 years ago
- Code behind areweslimyet.com☆31Feb 14, 2018Updated 8 years ago
- ☆68Jun 19, 2015Updated 10 years ago
- A web client for Irssi☆10Dec 12, 2017Updated 8 years ago
- MATLAB Implementation of Harmony Search, a nature inspired optimization algorithm☆10Dec 1, 2016Updated 9 years ago
- invader game in vim☆12Sep 22, 2011Updated 14 years ago
- Reinforcement Learning Algorithms implemented by Erlang. This repository is mainly for the demonstration of the Reinforcement Learning me…☆11Dec 27, 2011Updated 14 years ago
- MIDI Synthesizer for Arduino☆10Dec 7, 2015Updated 10 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- ☆10Feb 8, 2024Updated 2 years ago
- Write Perl subroutines in other programming languages☆19Jul 10, 2025Updated 7 months ago
- "Container" for my brainfarts☆23Dec 30, 2015Updated 10 years ago
- TheYoke is an ultra-simple, polite feed aggregrator designed for use on the UNIX command line.☆23Feb 25, 2014Updated 12 years ago
- The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security development, testing and reverse engineering.☆11Apr 6, 2020Updated 5 years ago
- coekie's scripts for irssi☆20May 8, 2010Updated 15 years ago
- Dismiss The Overlay☆12Feb 27, 2021Updated 5 years ago
- KeyCastr, an open-source keystroke visualizer☆32Aug 29, 2014Updated 11 years ago
- Query a maildir's contents and print From info for use as a mutt query_command☆12Dec 21, 2023Updated 2 years ago
- streamcurse is a curses stream launcher, inspired by gapatos livestreamer-curses☆13Mar 11, 2022Updated 3 years ago
- Script to add grml (from grml.org) and more stuff to a USB key☆12Dec 20, 2017Updated 8 years ago
- Tool for decrypting files encrypted by the SynoLocker ransomware☆15Aug 22, 2014Updated 11 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Apr 25, 2016Updated 9 years ago
- Pentadactyl key mappings for Zotero☆19Jun 8, 2016Updated 9 years ago
- Ex command history reverse-i-search for Vim☆24Oct 5, 2013Updated 12 years ago
- Take screenshots using xvfb☆13May 23, 2013Updated 12 years ago
- Indicate anchors in a web page☆11Feb 5, 2026Updated last month
- Набор скриптов для установки Debian/Ubuntu через debootstrap☆13Jul 12, 2012Updated 13 years ago
- Stripped down version of raspi-config for ArchLinux ARM☆14Feb 4, 2018Updated 8 years ago
- A hybrid cloud model blends elements of both the private and the public cloud. In the simplest terms, the hybrid model is primarily a pri…☆10May 24, 2021Updated 4 years ago
- Puppet setup to install my own workstation☆13Mar 2, 2026Updated last week
- Runcom files for Vim and Bash☆12May 17, 2022Updated 3 years ago
- ☆16Jul 21, 2018Updated 7 years ago