wyc / armbot
☆151Updated 10 years ago
Alternatives and similar repositories for armbot:
Users that are interested in armbot are comparing it to the libraries listed below
- Some code to bruteforce OpenBSD softraid encrypted drives - NOT A READY-TO-USE TOOL☆59Updated 8 years ago
- a small tool to quickly jump between directories☆16Updated 7 months ago
- A simple command line tool and library to identify popular file types.☆29Updated 6 years ago
- return-to-abort() - Using code introspection to prevent stack-smashing☆37Updated 4 years ago
- 🔄 Flexible C memory allocation scheme☆77Updated last month
- Minimal implementation of UNIX seq command in x86_64 assembly.☆40Updated 8 years ago
- com2txt tool (from 1993)☆30Updated 7 years ago
- Website contents for nommu.org☆10Updated 4 years ago
- run a command until a condition is met, then run another one!☆129Updated 10 years ago
- A SQL interface to your Linux kernel☆13Updated 9 years ago
- linux kernel updater preferring git to patching☆20Updated 7 years ago
- An exercise in cryptographic minimlism☆24Updated 10 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago
- Makefile Templates☆19Updated 8 years ago
- Software Development Platform for ARM / Android terminals☆39Updated 8 years ago
- state machine visual debugger☆121Updated 10 years ago
- a tiny, custom launcher that handles namespacing, control groups, chroot'ing, and more☆55Updated 2 years ago
- Blocks web pages from attaching to scroll events☆23Updated 9 years ago
- yet another lexical preprocessor☆40Updated 4 years ago
- A program to send Ethernet PAUSE frames☆36Updated 8 years ago
- Solitaire. Written inside the bootloader.☆56Updated 9 years ago
- An implementation of the unix commands yes, cat, and echo in as few bytes of executable as possible☆59Updated 8 years ago
- Graphical User Interfaces, The UNIX Way☆41Updated 7 years ago
- An evil teddy bear that steals your secrets☆39Updated 6 years ago
- A collection of steganography tools.☆15Updated 4 years ago
- Use some TLS servers for trusted timestamping☆42Updated 9 years ago
- fenc: a utility to just encrypt a file☆72Updated 2 years ago
- echo in 153 bytes (99% smaller) (x86)☆81Updated 7 years ago
- Chair and the Key☆65Updated 9 years ago
- Let's implement an Enigma machine as a char device just for fun.☆24Updated 4 years ago