☆12Oct 15, 2016Updated 9 years ago
Alternatives and similar repositories for hacking
Users that are interested in hacking are comparing it to the libraries listed below
Sorting:
- 道里名“基于身份”的公钥密码学技术与在线密钥管理系统☆10Jan 10, 2020Updated 6 years ago
- A lucky bitcoin of address generator - 比特币靓号地址生成器☆17Nov 3, 2018Updated 7 years ago
- A chrome extension i developed using javascript.☆10Sep 15, 2020Updated 5 years ago
- F.Security Framwork☆20Jul 10, 2016Updated 9 years ago
- proof of concept to backdoor files from owncloud encryption module☆17Mar 26, 2016Updated 9 years ago
- AVX-2 vectorised 8-bit positional popcount for Go☆23Aug 28, 2020Updated 5 years ago
- repo to discuss five basic object-oriented design principles and examples on it using C#☆15Feb 1, 2021Updated 5 years ago
- awesome-unikernels☆15May 21, 2015Updated 10 years ago
- This repo contains an explanation and implementation for common design patterns using C#☆19Feb 2, 2021Updated 5 years ago
- CoinBlock blocks services like CoinHive from using your browser to mine cryptocurrency without your consent.☆12Oct 15, 2017Updated 8 years ago
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Apr 24, 2025Updated 10 months ago
- Proof-of-concept implementation of the (V)OPRF protocol in https://datatracker.ietf.org/doc/draft-irtf-cfrg-voprf/☆23Aug 24, 2020Updated 5 years ago
- Execute system calls over the network☆11Nov 17, 2014Updated 11 years ago
- Tiny app to host static sites.☆12Oct 7, 2024Updated last year
- Kali-Linux menu for openbox☆16Jun 19, 2019Updated 6 years ago
- Resources☆35Feb 13, 2019Updated 7 years ago
- WordPress plugins by Pasi Lallinaho☆15Aug 23, 2024Updated last year
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Aug 5, 2024Updated last year
- A script to check metalink contents☆13Feb 14, 2020Updated 6 years ago
- Deadman is linux kernel module deadman-switch that responds to removal of a specific USB device (or the insertion of any).☆12Mar 9, 2023Updated 3 years ago
- A plugin for KeePass that highlights entries based on their password quality. Easily spot weak passwords and improve them.☆29Nov 30, 2021Updated 4 years ago
- Docker image: DNS over HTTPS proxy☆11Jun 26, 2020Updated 5 years ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆31Oct 26, 2023Updated 2 years ago
- Cgiemail - Source Code Disclosure/LFI☆16Oct 21, 2016Updated 9 years ago
- [RFC9380] Hash to curves - Rust reference implementation☆27Mar 10, 2024Updated 2 years ago
- [Anti-Forensics, Steganography, Data Exfiltration] Encrypt a file and hide it in any PDF.☆12Jun 8, 2017Updated 8 years ago
- uBlock/Adblock filters for NSA list of known compromised servers☆29Jun 28, 2018Updated 7 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Jan 13, 2017Updated 9 years ago
- My Bolg☆26Feb 26, 2026Updated 3 weeks ago
- A cross-platform GUI automation Python module for human beings. Used to programmatically control the mouse & keyboard.☆30Oct 10, 2015Updated 10 years ago
- A curated list of all essential job interview preparation materials.☆37Jun 7, 2018Updated 7 years ago
- lockfree concurrent containers.☆18Jun 11, 2016Updated 9 years ago
- ☆11Dec 22, 2025Updated 3 months ago
- UPC router default WPA2 key generator☆32Jul 11, 2016Updated 9 years ago
- Intel-Process communitation☆10Feb 27, 2017Updated 9 years ago
- This is a large list of ransomware decryptor from various link. Consist from various type of ransomware. Feel free to contribute.☆17Mar 3, 2017Updated 9 years ago
- Sticky headers that hide on scroll☆18Apr 5, 2019Updated 6 years ago
- Go implementation of bcrypt_pbkdf(3) from OpenBSD☆15Feb 5, 2015Updated 11 years ago
- V1.0☆14Aug 8, 2016Updated 9 years ago