matthewearl / gchq-xmasLinks
A solver for GCHQ's christmas card puzzle
☆12Updated 10 years ago
Alternatives and similar repositories for gchq-xmas
Users that are interested in gchq-xmas are comparing it to the libraries listed below
Sorting:
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Updated 11 years ago
- Very simple runtime hooking library for OS X.☆15Updated 10 years ago
- ☆25Updated 10 years ago
- Alternative hexdump.☆15Updated 9 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 11 years ago
- Python tool for bulk PDF feature extraction. This tool is a prototype.☆25Updated 8 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Updated 9 years ago
- A virtual PDF analysis framework☆17Updated 11 years ago
- OS X rootkit loader version #2☆12Updated 10 years ago
- Discover potential timestamps within the Windows Registry☆19Updated 11 years ago
- A kernel extension and userland daemon to patch applications☆103Updated 12 years ago
- python client/server keystroke logger☆23Updated 13 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- MPRESS dumper for OS X☆65Updated 11 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 5 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Updated 11 years ago
- A Simple Network Stream Recorder☆35Updated 6 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 9 years ago
- Generate strong passwords using /dev/urandom 👻☆15Updated 8 years ago
- Showing entropy analysis examples for different data types. example.sh was used to generate. It utilizes cyphunks libdisorder branch and …☆13Updated 10 years ago
- Generic binary file parser☆59Updated 11 years ago
- Dines is the definitive answer to DNS testing☆21Updated 7 years ago
- Functions and other Code Snippets often found in Offensive Code or Malware☆22Updated 10 years ago
- Win32 Python code for tracing malware activities on infected hosts☆26Updated 9 years ago
- ctypes bindings for libphash to robustly compare media files☆12Updated 2 years ago
- Troopers Conference Supporting Materials☆12Updated 10 years ago
- Materials from presentation☆20Updated 9 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- Tor relay nearest neighbour ranking☆10Updated 4 years ago
- A tiny tool to learn the assembly code☆12Updated 8 years ago