veorq / BLAKEView external linksLinks
SHA-3 finalist (reference code)
☆41May 2, 2014Updated 11 years ago
Alternatives and similar repositories for BLAKE
Users that are interested in BLAKE are comparing it to the libraries listed below
Sorting:
- A set of tools to work with cgroup tree and process classification/QoS according to it☆10Oct 1, 2019Updated 6 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- Portable C Compiler (CVS mirror)☆12Apr 9, 2012Updated 13 years ago
- Collecting data from the state of UDP buffers☆14Jan 30, 2017Updated 9 years ago
- Tools and library to manipulate EFI variables.☆10Jan 16, 2026Updated 3 weeks ago
- Generator of "nothing-up-my-sleeve" constants☆24Jul 3, 2015Updated 10 years ago
- Create shellcode from executable or assembly code☆12Jul 31, 2017Updated 8 years ago
- 🦑 A friendly Ruby API to iptables.☆15May 6, 2017Updated 8 years ago
- ☆29Oct 4, 2013Updated 12 years ago
- collection of Libav topic branches☆25May 21, 2019Updated 6 years ago
- Memory forensic tool for process resurrection starting from a memory dump☆20Jun 6, 2017Updated 8 years ago
- runtime code injector for Linux☆26May 29, 2011Updated 14 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Mar 14, 2014Updated 11 years ago
- I publish here my patch sets for Linux☆31Apr 21, 2019Updated 6 years ago
- a simple irc bouncer written in go☆17Jun 9, 2018Updated 7 years ago
- hook: linux kernel syscall hijack☆21Dec 28, 2016Updated 9 years ago
- Operating systems playground.☆16Sep 3, 2019Updated 6 years ago
- Hardware implementation of the blake2 hash function☆25Oct 8, 2020Updated 5 years ago
- Thread Injection Kit. A notorious little attempt to create Windows CreateRemoteThread() equivalent on unix (*nix) platform.☆49Jul 10, 2011Updated 14 years ago
- Frexx C preprocessor (single C file version)☆31May 21, 2017Updated 8 years ago
- Reference implementations (software)☆85Nov 11, 2016Updated 9 years ago
- Recon materials☆27Nov 18, 2017Updated 8 years ago
- Arp spoof detection tool☆26Jun 30, 2017Updated 8 years ago
- Data over audio☆84Sep 25, 2018Updated 7 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆95Jun 13, 2021Updated 4 years ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- Configuration and Programs for activating IMU data on Emlid Reach☆11Feb 4, 2018Updated 8 years ago
- Damn vulnerable linux device driver for people to play with.☆28Feb 25, 2020Updated 5 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆16May 3, 2014Updated 11 years ago
- A fake libpulse.so library that mimics pulseaudio behavior for skype☆26Jun 3, 2017Updated 8 years ago
- Searches for interesting cached DNS entries.☆55May 15, 2014Updated 11 years ago
- Rust bindings to aubio☆11Apr 13, 2020Updated 5 years ago
- Tool to create and test shellcodes from custom assembly sources (with some encoding options)☆34Aug 22, 2018Updated 7 years ago
- Reverse-engineering tools for Android applications☆56Aug 2, 2011Updated 14 years ago
- Inject shellcode into running processes in Linux.☆43Jul 10, 2024Updated last year
- E300 Development☆11Feb 1, 2024Updated 2 years ago
- Linux kernel source tree for Amazon Kindle devices. Re-upload of GPL release☆12Aug 13, 2021Updated 4 years ago
- An Erasure Code Library with Efficient Repair and Update Features☆11Jan 3, 2022Updated 4 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 7 years ago