lojikil / chashaLinks
A Flask-like µFramework for Gopher
☆20Updated this week
Alternatives and similar repositories for chasha
Users that are interested in chasha are comparing it to the libraries listed below
Sorting:
- SECD machine and Lispkit Lisp compiler, in Python☆10Updated 7 years ago
- Detect passive activity in the Tor-network☆13Updated 10 years ago
- ☆17Updated 7 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Updated 10 years ago
- Analysis of archived Tor relay RSA public keys☆24Updated 7 years ago
- Code to fuzz bignum libraries☆46Updated 6 years ago
- a grammar-based data generator☆60Updated 6 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆141Updated 10 years ago
- A DOM-Inspired Ruby Smart Fuzzer☆56Updated 16 years ago
- Tools to interact with a certificate transparency server☆23Updated 9 years ago
- OWASP ZSC API http://api.z3r0d4y.com/v2☆9Updated 8 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- Haxathon Supremacy Virtual Machine☆32Updated 8 years ago
- Experimental High Assurance Cryptographic Library☆20Updated 9 years ago
- Collection of somewhat useful stuff for CTF events☆36Updated 10 years ago
- Creates fuzzing inputs for command line programs using help options and man pages.☆28Updated 10 years ago
- carML - a yummy and sweet ML dialect☆19Updated 3 years ago
- A collection of shellcodes for BSD and Linux for exploit development☆26Updated 14 years ago
- System call fuzzing of OpenBSD amd64 using TriforceAFL (i.e. AFL and QEMU)☆46Updated 7 years ago
- ☆36Updated 12 years ago
- a tiny, custom launcher that handles namespacing, control groups, chroot'ing, and more☆55Updated 2 years ago
- Project for the Crypto subject at Uni☆18Updated 8 years ago
- strings for a Linux process' address space☆51Updated 12 years ago
- A Genetic File, Syscall and Network Fuzzer.☆58Updated 8 years ago
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago
- rune - radare2 based symbolic emulator☆27Updated 7 years ago
- Visual Interface heXadecimal dump☆52Updated 8 years ago
- Papers on reverse engineering and assembly language programming☆38Updated 4 years ago
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆33Updated 7 years ago