☆34Sep 30, 2019Updated 6 years ago
Alternatives and similar repositories for r2lrn
Users that are interested in r2lrn are comparing it to the libraries listed below
Sorting:
- A Burp Suite Professional extension for decrypting/decoding various types of cookies.☆12Jun 12, 2019Updated 6 years ago
- Collection of cracked malware☆15Dec 28, 2018Updated 7 years ago
- Code Injector Using Code Caves☆15Jul 12, 2015Updated 10 years ago
- Simple and small library that allows disassembly of raw bytes for multiple architectures☆30May 5, 2023Updated 2 years ago
- Repository for holding script-functions that are published to the PowerShell Gallery.☆22Sep 11, 2019Updated 6 years ago
- This is the python wrapper for The Security Framework SRDF☆49Apr 29, 2014Updated 11 years ago
- My notes about Genyatyk VM crackme☆26Jun 27, 2020Updated 5 years ago
- ☆10Apr 20, 2022Updated 3 years ago
- Random Code Snippets☆30May 24, 2019Updated 6 years ago
- ☆35Dec 2, 2018Updated 7 years ago
- A collection of some of my basic ComfyUI workflows. Feel free to build on these.☆12Jun 29, 2024Updated last year
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆52May 16, 2025Updated 9 months ago
- A powerful Unity ECS system to render massive numbers of animated sprites.☆11Sep 22, 2019Updated 6 years ago
- Tareas y plazos para los alumnos de 1º DAM del IES Campanillas del curso 2019/2020 en la asignatura de Programación.☆10Jun 1, 2020Updated 5 years ago
- "Actionable Ethics for Data Scientists" Workshop Material @ ODSC☆10May 31, 2024Updated last year
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆10Updated this week
- My solutions for pwn and reversing challenges☆10Mar 18, 2018Updated 7 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- ☆11Jun 15, 2018Updated 7 years ago
- ROM built with CMake☆11Jan 24, 2023Updated 3 years ago
- The source code for my PyCon 2017 talk "5 ways to deploy you Python web app in 2017"☆10May 19, 2017Updated 8 years ago
- Recreating and reviewing the Windows persistence methods☆39Nov 18, 2021Updated 4 years ago
- Minimalist compiler course, based on Essential of Compilation☆11Updated this week
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- A PT2399-Based Reverb Pedal☆11Nov 19, 2023Updated 2 years ago
- A blog about Coq☆11Mar 21, 2021Updated 4 years ago
- Fork of TMK controller firmware for my NPH60 custom keyboard☆12Nov 28, 2016Updated 9 years ago
- A Lua to Wren compiler in Wren.☆15Feb 5, 2020Updated 6 years ago
- Spectre variant 1 exploitation via PRIME+PROBE☆10May 22, 2019Updated 6 years ago
- Various CTF challenge solutions☆12Apr 20, 2021Updated 4 years ago
- ☆14Dec 1, 2020Updated 5 years ago
- FreeBSD src tree (read-only mirror)☆12Jan 14, 2019Updated 7 years ago
- c语言实现的能在windows和linux下运行的http服务器,支持动态页面☆11Jul 18, 2016Updated 9 years ago
- an informative progress bar for Python 2+3 command-line tools☆12Nov 18, 2019Updated 6 years ago
- Backup of old Subversion repo☆11Oct 22, 2019Updated 6 years ago
- L'application pour bloquer un paquet, snipping, analyser le réseau☆11Dec 23, 2016Updated 9 years ago
- PowerShell abstract syntax tree rewriter library☆11Jan 30, 2019Updated 7 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- My version of driller using Intel PIN and angrgdb. In "theory" can work with AFL in deferred and persistent mode.☆13Feb 10, 2019Updated 7 years ago