matthewearl / gchq-xmas
A solver for GCHQ's christmas card puzzle
☆12Updated 9 years ago
Alternatives and similar repositories for gchq-xmas
Users that are interested in gchq-xmas are comparing it to the libraries listed below
Sorting:
- Python library for image hashing and deduplication☆11Updated 9 years ago
- Linux kernel modules used to enumerate devices various buses☆11Updated 8 years ago
- Alternative hexdump.☆15Updated 9 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Updated 8 years ago
- ☆24Updated 9 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Updated 9 years ago
- A python reddit bot for responding to mentions or comments with a markov chain sentence.☆9Updated 3 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- Redress Dissassembler is a cross platform binary disassembler written in Java with Capstone bindings☆24Updated 9 years ago
- Windows Installation Diff Tool☆10Updated 8 years ago
- This is a framework for automatically finding bugs, and exploiting them...☆5Updated 9 years ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆28Updated 10 years ago
- ☆39Updated 9 years ago
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Updated 2 years ago
- PoC kext to disable OS X anti-virus software☆15Updated 13 years ago
- Simple script for comparing HTML DOM trees using Zhang Shasha algorithm☆9Updated 5 years ago
- Python tool for bulk PDF feature extraction. This tool is a prototype.☆24Updated 8 years ago
- A developer-friendly framework for exhaustive analysis of (PCAP and PE) files.☆15Updated 7 years ago
- Proof Of Concept for inserting code in ELF binaries.☆26Updated 11 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Updated 10 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- Domain name classifier looking for good vs. possibly malicious providers☆33Updated 7 years ago
- ☆16Updated 7 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 11 years ago
- Graph-theoretical investigation of a corpus of malware obtained from the web☆21Updated 10 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆31Updated 9 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 7 years ago
- Source code and sample exploits for the Stripe CTF Winter 2012☆43Updated 13 years ago
- A Simple Network Stream Recorder☆35Updated 6 years ago
- ☆13Updated 7 years ago