Generate strings that match multiple regex | "The plural of regex is regrets"
☆29Apr 21, 2026Updated last week
Alternatives and similar repositories for regrets
Users that are interested in regrets are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Generatore di rumore scimmiesco in contesto di gare A/D☆11Jul 7, 2023Updated 2 years ago
- ☆12Sep 19, 2023Updated 2 years ago
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆27Jun 18, 2024Updated last year
- GDB cheatsheet for reversing binaries☆21Jan 25, 2019Updated 7 years ago
- A guided mutation-based fuzzer for ML-based Web Application Firewalls☆200Mar 6, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Android Al-Khaser☆14Dec 12, 2023Updated 2 years ago
- PINTool to help analyzing malware that uses process injection☆16Jan 3, 2022Updated 4 years ago
- Process Injection without R/W target memory and without creating a remote thread☆19Feb 14, 2022Updated 4 years ago
- Bot per leggere i livelli idrometrici dei fiumi dell'Emilia Romagna riportati da allertameteo.regione.emilia-romagna.it.☆13Apr 23, 2026Updated last week
- Transformer Neural Network for Dynamic Malware Detection☆41Mar 5, 2026Updated last month
- My Linux profiles built for Volatility 2/3☆11Oct 11, 2025Updated 6 months ago
- ☆17Nov 24, 2025Updated 5 months ago
- Contains challenges, write-ups, and deployment configurations from b01lersCTF 2023.☆12Apr 3, 2023Updated 3 years ago
- Create adversarial attacks against machine learning Windows malware detectors☆246Nov 27, 2025Updated 5 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A tool for parallel and distributed enumeration of cliques and diameter two kplexes.☆15Dec 24, 2022Updated 3 years ago
- A tool to audit Erlang & Elixir dependencies, to make sure your ✨ gleam projects really sparkle!☆24Apr 15, 2026Updated 2 weeks ago
- Arduino library to support I-NUCLEO-LRWAN1 LoRa® expansion board based on USI® LoRaWAN™ technology module.☆17Sep 4, 2025Updated 7 months ago
- Notes from the Computational Mathematics course held by professor Antonio Frangioni and professor Federico Poloni at University of Pisa☆12Aug 28, 2021Updated 4 years ago
- A handy CLI tool for bulk-sending emails☆17Mar 6, 2025Updated last year
- Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples☆18May 23, 2022Updated 3 years ago
- ☆16Updated this week
- ☆20Aug 4, 2022Updated 3 years ago
- implementation of some algorithms seen during the Algorithm Engineer course @ UniPi☆19Jan 29, 2019Updated 7 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆22Dec 28, 2024Updated last year
- Proof of Concepts for unsafe deserialization in Ruby☆17Oct 17, 2024Updated last year
- A collection of libraries and tools to create programming challenges and competitions☆15Mar 3, 2023Updated 3 years ago
- Toolset to analyze disks encrypted with McAFee FDE technology☆19Mar 11, 2021Updated 5 years ago
- A curated list of ressources for Volatility 2 & 3☆13Mar 17, 2024Updated 2 years ago
- Official code for Continuous-Time Functional Diffusion Processes (NeurIPS 2023).☆21May 5, 2024Updated last year
- Alleycat plugin by devttys0, ported to IDA 7☆16Apr 29, 2018Updated 8 years ago
- VCrypture is an online service that allows you to encrypt your secret images safely using visual cryptographic algorithms.☆22Aug 13, 2020Updated 5 years ago
- CrushFTP <= 10.5.1 Remote Code Execution. Researchers: Ryan Emmons, Evan Malamis☆17Jun 14, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This is a Java program that exploits Spring Break vulnerability (CVE-2017-8046).☆17Jun 4, 2021Updated 4 years ago
- A web application that builds a social coding platform upon CMS☆22Apr 17, 2026Updated 2 weeks ago
- A 3d printed case design for Lichee Pi 4A☆11May 13, 2023Updated 2 years ago
- SecML-Torch: A Library for Robustness Evaluation of Deep Learning Models☆106Apr 23, 2026Updated last week
- Gendered Ambiguous Pronouns Shared Task☆31Nov 21, 2022Updated 3 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆15Jul 7, 2021Updated 4 years ago
- Blocking lists of IP addresses from blocklists / blacklists (e.g. blocklist.de, spamhaus.org) via ipset and ufw☆19Nov 6, 2023Updated 2 years ago