rtkd / iddqdLinks
3301 - Unmodified files, transcription and other assets.
☆187Updated 2 years ago
Alternatives and similar repositories for iddqd
Users that are interested in iddqd are comparing it to the libraries listed below
Sorting:
- ☆127Updated 2 years ago
- Open-source decompile of Stuxnet/myRTUs☆765Updated 7 years ago
- An educational demonstration of breaking the Enigma machine☆487Updated 5 years ago
- ☆18Updated 9 years ago
- run HolyC on Linux secularly☆344Updated 3 years ago
- An asemic Markov-chained cipher☆202Updated 5 years ago
- The decompiled Morris Worm source code☆642Updated 5 years ago
- Thirteen Years of Tor Attacks☆330Updated 2 years ago
- It is important to stress that we have not written this piece of software (see LICENSE)☆389Updated 2 years ago
- Audio file steganography. Hides files or text inside audio files and retrieve them automatically☆289Updated 2 years ago
- Kitboga's UpDog Credit Union☆46Updated 7 years ago
- BitChan is a decentralized anonymous imageboard inspired by BitBoard and built on top of BitMessage with Tor and GnuPG.☆84Updated 3 weeks ago
- 4chan browser for the ESP32☆68Updated last year
- µchan – Fast anonymous imageboard software☆133Updated 2 years ago
- An infinity fork focused on security.☆147Updated 5 years ago
- ☆55Updated 4 years ago
- Library of Babel clone in Python☆194Updated 3 years ago
- CrackStation.net's Lookup Table Implementation.☆401Updated 7 years ago
- Mirror of Shadowbrokers release from https://steemit.com/shadowbrokers/@theshadowbrokers/lost-in-translation☆483Updated 8 years ago
- An archive of Shii's Wiki (a major source for and the inspiration for the Bibliotheca Anonoma), which was uncermoniously deleted by the m…☆16Updated 7 years ago
- moved to https://github.com/ircart/ircart/wiki☆22Updated 2 years ago
- End-To-End File & Message Encryption For Discord☆191Updated 4 years ago
- Self-replicating, self-modifying Assembly program that can evolve into every possible computer program in the universe (EXPERIMENTAL)☆63Updated 5 years ago
- Prevent RubberDucky (or other keystroke injection) attacks☆528Updated last year
- ssh textboard☆24Updated 5 years ago
- Pipeline of a keylogging attack using just an audio signal and unsupervised learning.☆154Updated 3 years ago
- This bot can help you invest in memes and make a fortune out of it!☆135Updated 6 years ago
- Simple tools to make reverse engineering and console cowboying easier, primarily by data translation and manipulation + file handle pipin…☆609Updated 5 months ago
- The Zenith Operating System is a modern, professional fork of the 64-bit Temple Operating System, designed to survive societal collapse.☆61Updated 5 years ago
- ☎️ Original open source call flooder using Twilio's API.☆346Updated 3 years ago