A solver for GCHQ's christmas card puzzle
☆12Dec 14, 2015Updated 10 years ago
Alternatives and similar repositories for gchq-xmas
Users that are interested in gchq-xmas are comparing it to the libraries listed below
Sorting:
- collection of scripts and stuff☆12Aug 15, 2016Updated 9 years ago
- Search inside Snowden/NSA/GCHQ/whatever documents☆11Jul 11, 2014Updated 11 years ago
- Binary, Analysis, and Disassembler Radare2 Plugins for Dan32 architechture binaries☆18Aug 21, 2017Updated 8 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- Use OpenDNS's investigate API to find newly observed domains which match a brand or string☆17Jul 12, 2016Updated 9 years ago
- CFURL Cache inspector for Burp Suite☆18Dec 8, 2020Updated 5 years ago
- A security write-up about the Paypal API & data leakage☆25May 27, 2016Updated 9 years ago
- Trust Zone Project☆21Jan 6, 2015Updated 11 years ago
- Clone of the IDAPython repo☆23Mar 16, 2015Updated 10 years ago
- A pure-python win32 debugger interface.☆28Jan 10, 2016Updated 10 years ago
- Collection of Praetorian solutions to CTF challenges☆25Apr 20, 2018Updated 7 years ago
- IDA Python Scripts☆45Jul 19, 2009Updated 16 years ago
- a GUI Interface for DFIR Open Source Tools☆10Jun 16, 2015Updated 10 years ago
- Documentation, sample inputs, and sample programs that use the dpkt library☆87May 18, 2016Updated 9 years ago
- DEPRECATED USE v3!☆59Sep 8, 2015Updated 10 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆38May 29, 2018Updated 7 years ago
- Templating engine based on shell interpolation☆32Apr 29, 2017Updated 8 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- RemoteBridge is a library that allows you to access internal COM and JAVA objects used by third-party applications remotely.☆35Oct 11, 2017Updated 8 years ago
- Copy and Paste standard library (CPSTL) is a repository with a collection of data structure and algorithms in many different languages☆13Feb 15, 2025Updated last year
- ☆10Jan 28, 2013Updated 13 years ago
- pre-release.☆12Jul 15, 2015Updated 10 years ago
- ICC Examin colour profile, CGATS measurement, VRML gamut and ncl2 viewer☆10Oct 17, 2022Updated 3 years ago
- A many-core capable lightweight in situ visualization and analysis infrastructure for multi-physics HPC simulations☆10Nov 9, 2017Updated 8 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆32Nov 29, 2015Updated 10 years ago
- Dead simple JSON Formatter☆10Oct 21, 2016Updated 9 years ago
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆11Jul 9, 2014Updated 11 years ago
- Identifies music based on microphone input. By request of someone in r/learnprogramming.☆19Dec 8, 2012Updated 13 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- Tampermonkey script to extract information from Meteor applications☆34Nov 3, 2016Updated 9 years ago
- Wikileaks Centipede Viewer to view Wikileaks emails☆10Jul 17, 2018Updated 7 years ago
- A collection of advent of code solutions.☆10Dec 28, 2015Updated 10 years ago
- A C++ library for reading the files used in Volker Springel's Gadget code☆12Aug 17, 2017Updated 8 years ago
- IDASimulator is a plugin that extends IDA's conditional breakpoint support, making it easy to augment / replace complex executable code i…☆46Sep 2, 2014Updated 11 years ago
- Picon☆39Apr 16, 2017Updated 8 years ago
- An Integrity-Check Monitoring Pintool☆58Nov 2, 2020Updated 5 years ago
- CLI string generator based on regex-like operations☆41Apr 14, 2020Updated 5 years ago
- Portable PDB native support☆12Nov 24, 2023Updated 2 years ago
- ☆14Sep 24, 2012Updated 13 years ago