larryv / learn-c-the-hard-wayView external linksLinks
A few exercises from Zed Shaw’s “Learn C the Hard Way”
☆21Dec 16, 2019Updated 6 years ago
Alternatives and similar repositories for learn-c-the-hard-way
Users that are interested in learn-c-the-hard-way are comparing it to the libraries listed below
Sorting:
- Write Up I write for different CTFs☆12Nov 20, 2017Updated 8 years ago
- HackToday is annual ctf competition held by Cyber Security IPB☆17Mar 19, 2021Updated 4 years ago
- A collection of small hacks I wrote over the years☆36Feb 1, 2023Updated 3 years ago
- Files to build Docker image of Capture the Flags (CTF) game☆19Jan 25, 2018Updated 8 years ago
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Oct 31, 2017Updated 8 years ago
- Repository for Insomni'hack finals 2015☆22Mar 30, 2015Updated 10 years ago
- JSON-based FON (Feature Object Notation) format and tools to simplify genomic annotations usage☆13Jun 11, 2025Updated 8 months ago
- Samsung CTF 2017 Problems. https://sctf.codeground.org☆24Sep 3, 2018Updated 7 years ago
- Code behind areweslimyet.com☆31Feb 14, 2018Updated 8 years ago
- ☆68Jun 19, 2015Updated 10 years ago
- MIDI Synthesizer for Arduino☆10Dec 7, 2015Updated 10 years ago
- The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security development, testing and reverse engineering.☆11Apr 6, 2020Updated 5 years ago
- TheYoke is an ultra-simple, polite feed aggregrator designed for use on the UNIX command line.☆23Feb 25, 2014Updated 11 years ago
- invader game in vim☆12Sep 22, 2011Updated 14 years ago
- A web client for Irssi☆10Dec 12, 2017Updated 8 years ago
- Write Perl subroutines in other programming languages☆19Jul 10, 2025Updated 7 months ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 7 years ago
- Reinforcement Learning Algorithms implemented by Erlang. This repository is mainly for the demonstration of the Reinforcement Learning me…☆11Dec 27, 2011Updated 14 years ago
- "Container" for my brainfarts☆23Dec 30, 2015Updated 10 years ago
- ☆10Feb 8, 2024Updated 2 years ago
- MATLAB Implementation of Harmony Search, a nature inspired optimization algorithm☆10Dec 1, 2016Updated 9 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- password store☆17Apr 21, 2014Updated 11 years ago
- PostScript examples useful for attacking Ghostscript.☆13Aug 1, 2024Updated last year
- Naehrig, Niederhagen and Schwabe's pairings code, massaged into a shared library.☆17Apr 19, 2016Updated 9 years ago
- A set of tools to work with cgroup tree and process classification/QoS according to it☆10Oct 1, 2019Updated 6 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Apr 25, 2016Updated 9 years ago
- Indicate anchors in a web page☆11Feb 5, 2026Updated last week
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 8 years ago
- Query a maildir's contents and print From info for use as a mutt query_command☆12Dec 21, 2023Updated 2 years ago
- KeyCastr, an open-source keystroke visualizer☆32Aug 29, 2014Updated 11 years ago
- 一款运行在SAE Python上采用FLASK开发的轻型博客程序☆20Aug 23, 2012Updated 13 years ago
- Ex command history reverse-i-search for Vim☆24Oct 5, 2013Updated 12 years ago
- Small tool to run reverse IP lookup for given IP, IP range or IP list☆12Jan 2, 2020Updated 6 years ago
- Assembly/Shellcode☆14Oct 28, 2014Updated 11 years ago
- A kernel module that lists all current tasks in a Linux system☆15Dec 13, 2015Updated 10 years ago
- all config files that I use/used☆18Jan 29, 2026Updated 2 weeks ago
- Tool for decrypting files encrypted by the SynoLocker ransomware☆15Aug 22, 2014Updated 11 years ago
- UPC Deep Learning for Speech and Language 2018☆17Feb 26, 2018Updated 7 years ago