face hash Checking data integrity with hyper-realistic human faces Cryptographic hash functions are widely used to verify data integrity, but it is difficult for people to remember hexadecimal (or, even worse, binary) representations.
Cloak Cloud is a plug—in transport that extends the capabilities of traditional proxy tools such as Shadowsocks, OpenVPN and Tor to avoid sophisticated censorship and data discrimination.
ECP32 Linux WiFi OTA Crasher This is a small PC running on ASP 32 and using CVE-2022-42722 to system crash all Linux kernel devices over a wireless Wi-Fi network.
gpg-fingerprint-filter-gpu Allows you to generate OpenPGP keys whose fingerprint corresponds to a certain "beautiful" template. (Solely for the sake of vanity))