tst-race / race-quickstart
☆87Updated 6 months ago
Alternatives and similar repositories for race-quickstart:
Users that are interested in race-quickstart are comparing it to the libraries listed below
- ☆22Updated 3 months ago
- Simple demo illustrating remanence of data in RAM (see Cold boot attack) using a Raspberry Pi. Loads many images of the Mona Lisa into R…☆102Updated last year
- Nyxelf is a highly effective tool tailored for analyzing malicious Linux ELF binaries, offering comprehensive support for both static and…☆104Updated last month
- a set of simple steps to get from "I don't know WTF BBQ" to "I am service provider"☆52Updated last year
- Research and proof of concept to develop the next SecureDrop with end to end encryption.☆48Updated 3 weeks ago
- Detecting Inconsistencies in Feature or Function Evaluations of Requirements☆67Updated 11 months ago
- Visualize binary files☆130Updated 2 months ago
- a web fuzzer using the httpipe format☆100Updated 11 months ago
- make requests to apples bssid database☆13Updated 9 months ago
- Extracts and decrypts passwords saved in Firefox.☆205Updated 10 months ago
- Damn Vulnerable UEFI☆270Updated 5 months ago
- ☆93Updated 11 months ago
- A command-line utility that scans for Wi-Fi networks using the 802.11 netlink API.☆29Updated last week
- Tiny, rough-and-ready quantum circuit simulator for exploring quantum networking and computing.☆33Updated 10 months ago
- ☆47Updated last year
- simple client-side in-browser binary analysis and hex dump☆57Updated last month
- CLI based packet reader in Python.☆101Updated 6 months ago
- CellGuard is a research project that analyzes how cellular networks are operated and possibly surveilled☆107Updated 2 months ago
- create local malicious git repo☆50Updated last week
- TideCloak lets your users hold their own digital authority—no central control, no blind trust.☆62Updated 3 weeks ago
- Toolkit for creating cryptographic figures and videos.☆31Updated 9 months ago
- SHA256 sentence: discover a SHA256 checksum that matches a sentence's description of hex digit words.☆21Updated last year
- TCP ISN CPU Information Leak Protection. TCP Initial Sequence Numbers Randomization to prevent TCP ISN based CPU Information Leaks.☆47Updated last month
- An evolving toolkit of capabilities helpful for reverse engineering legacy Cobol code☆97Updated 2 months ago
- GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers -- USENIX Security'24☆251Updated 8 months ago
- A guide to downloading all public DDoSecrets releases via torrent☆47Updated last year
- A Ninja's Handbook: A book on privacy, security, and anonymity online.☆89Updated 6 months ago
- RebootX On-Prem is an open source specification for defining a custom server in order to manage on-premise runnables and dashboards in th…☆98Updated last month