matthewaveryusa / whitekitLinks
whitekit
☆18Updated 9 years ago
Alternatives and similar repositories for whitekit
Users that are interested in whitekit are comparing it to the libraries listed below
Sorting:
- A public database for software and firmware hashes☆215Updated 8 years ago
- Pretty Curved Privacy☆122Updated 7 years ago
- Index of websites publishing bugs along the lines of heartbleed.com☆40Updated 7 years ago
- Hack your friend's online MMORPG game - specific focus, php file upload scripts☆100Updated 8 years ago
- ☆115Updated 9 years ago
- return-to-abort() - Using code introspection to prevent stack-smashing☆37Updated 4 years ago
- netcat that takes unfair advantage of traffic shaping systems that don't initially ratelimit☆2Updated 4 years ago
- Chair and the Key☆64Updated 9 years ago
- HTTP framework☆48Updated 7 years ago
- 🔒 Simple perfect xor encryption cipher 🔒☆62Updated 8 years ago
- Live at http://extractdata.club☆167Updated 8 years ago
- ☆287Updated 8 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago
- A list of publicly known but unfixed security bugs☆237Updated 7 years ago
- Some code to bruteforce OpenBSD softraid encrypted drives - NOT A READY-TO-USE TOOL☆58Updated 8 years ago
- state machine visual debugger☆120Updated 10 years ago
- Various articles I've written☆115Updated 2 years ago
- Hazmat ECC arithmetic for Cryptography.io☆28Updated 5 years ago
- Trace And Rewrite Delays In Syscalls: Hooking time-related Linux syscalls to warp a process's perspective of time, using ptrace.☆160Updated last year
- Hackers in yo' kernel!☆59Updated 10 years ago
- Interactive language for electronic formulas☆90Updated 9 years ago
- The Swiss army knife of data examination and manipulation☆333Updated 6 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- Machine learning algorithm to connect anonymous accounts to real names☆95Updated 8 years ago
- Project for the Crypto subject at Uni☆18Updated 8 years ago
- Koszek-Matyja Network Simulator. Specify network architecture in a simple configuration file and run network simulations.☆59Updated 9 years ago
- This repository contains a docker container dedicated to reverse engineering☆84Updated 6 years ago
- Genetic BF programming☆60Updated 10 years ago
- The DrK Attack - Proof of concept☆343Updated 3 years ago
- SWC USB Adapter☆123Updated 6 years ago