vontell / nvOSLinks
An quantum operating system built around ARTIQ and NV centers in diamond.
☆12Updated 7 years ago
Alternatives and similar repositories for nvOS
Users that are interested in nvOS are comparing it to the libraries listed below
Sorting:
- Mirror of lascar (https://github.com/Ledger-Donjon/lascar)☆14Updated 6 years ago
- Upload external IP so you can find your devices elsewhere☆16Updated last year
- Ultimaker 2/2+ firmware with extruder fan control + interposer board☆10Updated 5 years ago
- RFID badge for DEF CON☆13Updated 8 years ago
- RFID reader, writer, spoofer in a convenient form factor☆13Updated 8 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 7 years ago
- A list of backdoor samples I find online.☆13Updated 5 years ago
- HydraSCA-LISN Dedicated Hardware 5uH Dual DC-LISN for Side-channel Analysis (SCA)☆12Updated last year
- Private Internet Access - Windows TAP adapter for Desktop VPN Client☆12Updated 5 years ago
- Configure SPI flash write protection.☆24Updated 5 years ago
- File antivirus☆10Updated 6 years ago
- Collection of Windows Driver Utils☆11Updated last year
- Teensy 3.1 Control-Board☆12Updated 9 years ago
- ☆17Updated 6 years ago
- Warning! Don't run this code on your computer.☆15Updated 6 years ago
- A socket to rule all other sockets.☆9Updated 9 years ago
- Binary Explorer is a simple CPLD board used in various digital circuit labs.☆10Updated 5 years ago
- 👶🏻😿 A network sniffer for Linux and macOS that currently (only) parses ETH, ARP, IP, ICMP, TCP, UDP, DNS - NOT for production!☆10Updated 6 months ago
- AppSecurityLimits - Allows Executables To Define Security Limits☆17Updated 5 years ago
- Library to support cross-platform AES encryption☆12Updated 9 months ago
- Python library for image hashing and deduplication☆11Updated 9 years ago
- ☆20Updated 3 years ago
- Source code on the 1.44MB 3.5 floppy accompanying the Windows NT File System Internals book.☆17Updated 5 years ago
- Network based steganography based control channels and chat.☆8Updated 9 years ago
- Infineon OPTIGA™ Trust X security solution library for Arduino☆11Updated 4 years ago
- A medley of PoCs and exploits☆1Updated 6 years ago
- Spark MLib Training Models for Network Security☆16Updated 7 years ago
- OpenCL application to blur an image, running inside Docker☆9Updated 7 years ago
- ☆13Updated 4 years ago
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to re…☆12Updated 9 years ago