vontell / nvOS
An quantum operating system built around ARTIQ and NV centers in diamond.
☆12Updated 7 years ago
Alternatives and similar repositories for nvOS:
Users that are interested in nvOS are comparing it to the libraries listed below
- Upload external IP so you can find your devices elsewhere☆15Updated 9 months ago
- Library to support cross-platform AES encryption☆11Updated 3 months ago
- Automatic generator of YARA modules based in protocol buffers☆16Updated 4 months ago
- Readline is a pure go(golang) implementation for GNU-Readline kind library☆13Updated 3 years ago
- ☆12Updated 4 years ago
- My software engineering notes.☆17Updated this week
- How to write inline c# in xaml☆8Updated 11 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 6 years ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Updated 4 years ago
- Network based steganography based control channels and chat.☆8Updated 8 years ago
- AppSecurityLimits - Allows Executables To Define Security Limits☆17Updated 5 years ago
- A list of backdoor samples I find online.☆13Updated 5 years ago
- Python library for image hashing and deduplication☆11Updated 8 years ago
- Private Internet Access - Windows TAP adapter for Desktop VPN Client☆12Updated 4 years ago
- ☆17Updated 6 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆12Updated 2 years ago
- Configure SPI flash write protection.☆23Updated 4 years ago
- Source code on the 1.44MB 3.5 floppy accompanying the Windows NT File System Internals book.☆15Updated 5 years ago
- RFID reader, writer, spoofer in a convenient form factor☆13Updated 7 years ago
- Mirror of lascar (https://github.com/Ledger-Donjon/lascar)☆14Updated 5 years ago
- module for certexfil☆15Updated 2 years ago
- A strcmp timing attack example☆9Updated 10 years ago
- A socket to rule all other sockets.☆9Updated 8 years ago
- File antivirus☆10Updated 5 years ago
- Cheatsheets on binary patterns and magic numbers for reverse engineering☆9Updated 3 years ago
- Hook for the PoC for exploiting CVE-2024-32002☆15Updated 8 months ago
- A blazing fast, highly customizable, modern-day defence tool using (in memory) SQL & REST/gRPC protocols.☆20Updated 10 months ago
- [Mirror] thc.org uses a CA that is not trusted on a base Arch system so we are mirroring some source here.☆13Updated 11 years ago
- A repo with a listing of binary ninja scripts + plugins (massively inspired by https://github.com/onethawt/idaplugins-list)☆16Updated 7 years ago