lojikil / chashaLinks
A Flask-like µFramework for Gopher
☆19Updated 10 years ago
Alternatives and similar repositories for chasha
Users that are interested in chasha are comparing it to the libraries listed below
Sorting:
- SECD machine and Lispkit Lisp compiler, in Python☆10Updated 7 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Updated 10 years ago
- Detect passive activity in the Tor-network☆13Updated 10 years ago
- Encodes data into printable Unicode characters.☆90Updated last month
- carML - a yummy and sweet ML dialect☆19Updated 3 years ago
- Experimental High Assurance Cryptographic Library☆20Updated 9 years ago
- Passphrase entry utility that aims to defeat hardware keyloggers and low-resolution spy cameras☆23Updated 7 years ago
- BitTorrent Tracker with upload & browsing, written on the 25th Chaos Communication Congress☆34Updated 11 years ago
- SECD microprocessor reimplementation in VHDL☆35Updated 5 years ago
- messing around writing reversing tools in clojure☆14Updated 7 years ago
- python tor client☆27Updated 9 years ago
- Repository for proxenet plugins☆14Updated 9 years ago
- A better SSL cipher checker using gnutls☆28Updated 8 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- Files compiled from the Logica breach investigation materials☆44Updated 6 years ago
- strings for a Linux process' address space☆51Updated 12 years ago
- ☆24Updated 9 years ago
- ☆9Updated 7 years ago
- Sign and verify author signatures on git commits☆17Updated 10 years ago
- Rexx scripts☆12Updated 10 years ago
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 7 years ago
- ☆17Updated 7 years ago
- Tools to interact with a certificate transparency server☆22Updated 9 years ago
- Analysis of archived Tor relay RSA public keys☆24Updated 7 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- Scripting Assembly Language☆12Updated 9 years ago
- A DOM-Inspired Ruby Smart Fuzzer☆56Updated 16 years ago
- SVFORTH - A Forth for Security Analysis and Visualization☆41Updated 11 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago