Phoenix
☆49Jan 16, 2019Updated 7 years ago
Alternatives and similar repositories for Phoenix
Users that are interested in Phoenix are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A general way to Recover Safe linking protected value/pointer☆15Oct 23, 2022Updated 3 years ago
- Sudo 1.6.x <= 1.6.9p21 and 1.7.x <= 1.7.2p4 Local Privilege Escalation and vulnerable container☆10Dec 16, 2017Updated 8 years ago
- ☆21Jan 7, 2019Updated 7 years ago
- Quick script to find info about a syscall in a target architecture☆18Jan 8, 2020Updated 6 years ago
- Writeup for the OverTheWire Advent Bonanza 2019 CTF (https://advent2019.overthewire.org/)☆14May 10, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Research framework for reverse engineering and cheat prototyping in Counter-Strike 2. Developed as part of a Master’s Thesis at UC3M.☆54Updated this week
- Tool to check for applicable windows updates for a given machine in offline without dependency on WSUS or WUA.☆11Sep 23, 2020Updated 5 years ago
- ☆24Nov 23, 2019Updated 6 years ago
- transfer ownership of any FB50 smart lock to yourself (CVE-2019-13143)☆17Aug 7, 2019Updated 6 years ago
- Python implementation of RSA reverse shell.☆11Dec 31, 2016Updated 9 years ago
- Personal Page☆22Jan 30, 2026Updated 2 months ago
- ☆11Feb 11, 2023Updated 3 years ago
- ptrace misconfiguration Local Privilege Escalation☆13Aug 11, 2023Updated 2 years ago
- This is a article that will teach you the basics of the go programming language in coordination to the article im doing on robust and sec…☆10Aug 15, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Proof Of Concept for inserting code in ELF binaries.☆25Mar 14, 2014Updated 12 years ago
- Half-Life 2 Gameplay Rebalance AI + is a mod-patch to the steam version of half life 2, aiming to improve AI, rework gameplay and to add …☆11Sep 22, 2023Updated 2 years ago
- Internship (research) project for SURF. Process (Net)Flow data into Nmap scans.☆12Jun 7, 2022Updated 3 years ago
- Microcorruption CTF☆12Jan 17, 2016Updated 10 years ago
- HotFuzz is a fuzz testing utility that generates random data and sends it to a service's endpoint over HTTP or HTTPS based on a given fuz…☆18Mar 14, 2021Updated 5 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- hacking tools awesome lists☆16Jul 26, 2017Updated 8 years ago
- Standalone rendezvous server: https://github.com/libp2p/specs/blob/master/rendezvous/README.md☆17Mar 13, 2023Updated 3 years ago
- 记录自己做的一些ctf题目☆11Aug 24, 2020Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- pgp.ustc.edu.cn deployment☆10Mar 25, 2019Updated 7 years ago
- Public release for b01lers CTF 2021. Thanks for playing!☆10Apr 10, 2021Updated 4 years ago
- pyGoRE - Python library for analyzing Go binaries☆66Feb 12, 2022Updated 4 years ago
- A small tool to bruteforce weak ethereum private keys and more☆11Jan 9, 2019Updated 7 years ago
- 使用intel pin来求解一部分CTF challenge☆32Jul 1, 2018Updated 7 years ago
- Repository for Binary Reverse Engineering exercises.☆12Jul 17, 2020Updated 5 years ago
- Hacker Animation Cool Console Kryptographic Sequencer (haccks)☆14Oct 14, 2024Updated last year
- Cmake 官方教程 -> 在线阅读☆11Mar 9, 2018Updated 8 years ago
- AtMail Email Server Appliance 6.4 - Exploit toolchain (XSS > CSRF > RCE)☆11Dec 8, 2022Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Source code of https://blahcat.github.io☆13Oct 6, 2025Updated 6 months ago
- A firewall reverse proxy for preventing Log4J (Log4Shell aka CVE-2021-44228) attacks.☆23Dec 14, 2021Updated 4 years ago
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆454Oct 5, 2025Updated 6 months ago
- The best way to send emails in Go.☆12Feb 4, 2021Updated 5 years ago
- A short and simple python crawler, that uses Webkit and executes Javascript☆16Jan 25, 2013Updated 13 years ago
- Importable Firefox profile for use with i2p. Also usable with Tor Browser on most platforms.☆17Jul 4, 2019Updated 6 years ago
- Linux Kernel Module Debugger☆15Sep 27, 2016Updated 9 years ago