lojikil / chashaLinks
A Flask-like µFramework for Gopher
☆20Updated 4 months ago
Alternatives and similar repositories for chasha
Users that are interested in chasha are comparing it to the libraries listed below
Sorting:
- SECD machine and Lispkit Lisp compiler, in Python☆10Updated 8 years ago
- Detect passive activity in the Tor-network☆13Updated 10 years ago
- Code to fuzz bignum libraries☆46Updated 7 years ago
- Tor relay nearest neighbour ranking☆10Updated 4 years ago
- carML - a yummy and sweet ML dialect☆19Updated 3 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆141Updated 11 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Updated 10 years ago
- A DOM-Inspired Ruby Smart Fuzzer☆56Updated 16 years ago
- strings for a Linux process' address space☆51Updated 12 years ago
- Introduction to using the Hammer parser construction toolkit by Meredith L. Patterson☆81Updated 8 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 7 years ago
- Tools to interact with a certificate transparency server☆23Updated 10 years ago
- a grammar-based data generator☆60Updated 6 years ago
- Return Oriented Programme Evolution with ROPER☆171Updated 6 years ago
- Analysis of archived Tor relay RSA public keys☆24Updated 7 years ago
- Papers on reverse engineering and assembly language programming☆38Updated 4 years ago
- rune - radare2 based symbolic emulator☆27Updated 8 years ago
- Generator of "nothing-up-my-sleeve" constants☆24Updated 10 years ago
- SECD microprocessor reimplementation in VHDL☆35Updated 6 years ago
- Experimental High Assurance Cryptographic Library☆20Updated 9 years ago
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆37Updated 3 years ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Updated 7 years ago
- ☆18Updated 8 years ago
- Allows to execute haskell code in Ida Pro.☆27Updated 9 years ago
- A Genetic File, Syscall and Network Fuzzer.☆58Updated 8 years ago
- ☆35Updated 13 years ago
- Encodes data into printable Unicode characters.☆90Updated 6 months ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- Crypto scanner☆43Updated 14 years ago
- Picon☆39Updated 8 years ago