qpwo / actual-malware
Useful library dependency
☆219Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for actual-malware
- 1/6 chance of posting your SSH private key on pastebin :)☆81Updated 5 months ago
- 🕹️ DOOM rendered via checkboxes in a web browser.☆176Updated 3 years ago
- this URL is also malicious(?!) shell script☆143Updated 2 months ago
- NodeJS runtime protection for supply chain attacks☆142Updated 2 years ago
- https://outage.bingo☆116Updated last year
- Implementation of the Folders📂 esoteric programming language, a language with no code and just folders.☆445Updated 2 years ago
- When ASCII art is the executable☆70Updated 2 years ago
- Linux kernel modules written in Scratch☆85Updated 2 years ago
- Heartf❤️ck: the most wholesome "programming language" by Laura Pircalaboiu and Ricardo Vogel. Python compiler by Jonathan Dönszelmann☆53Updated 3 years ago
- Is your site too light? Make it heavy with a single script!☆60Updated 2 months ago
- Perl code that is syntactically correct only on Fridays☆220Updated 2 years ago
- ☆247Updated 2 years ago
- An efficient drop-in replacement for JSON.☆153Updated 2 years ago
- Exploit chrome's profile sync for free cloud storage☆344Updated last year
- I patched my Slack client to keep messages that others delete☆348Updated 2 years ago
- Create awkward situations with my chrome extension that send you messages that look like an iMessage popup☆349Updated 2 years ago
- Kernel in TypeScript☆202Updated 2 years ago
- git is a blockchain. Start your commit hashes with 00000000 like a real blockchain should.☆253Updated 3 weeks ago
- an eslint plugin for import whitespace to follow a bezier curve☆36Updated last year
- Extremely Linear Git History // git-linearize☆582Updated 8 months ago
- doom rendered with emoji☆83Updated 2 years ago
- A boilerplate to explore iframe feedback☆38Updated 3 years ago
- Setaceous Versioning, the revolutionary new way to maintain software☆124Updated 2 years ago
- C Compiler which targets Excel (MS Office)☆286Updated 4 years ago
- A catalog of naturally occurring images whose Apple NeuralHash is identical.☆151Updated last year
- Implementation of Pong that runs within a mouse's firmware and renders by moving the cursor fast enough to acheive persistence of vision☆161Updated 3 months ago
- edgedressing leverages a Windows "feature" in order to force a target's Edge browser to open. This browser is then directed to a URL of …☆48Updated 5 months ago
- 💾 Create block devices on your computer backed by Redstone Memory☆90Updated last year
- HTML Is A Programming Language☆119Updated 2 years ago