Immudelki / IFSCL_CODELinks
Bits of code of IFSCL, just for the curious users ;)
☆11Updated last year
Alternatives and similar repositories for IFSCL_CODE
Users that are interested in IFSCL_CODE are comparing it to the libraries listed below
Sorting:
- The Keccak hash algorithm implemented inside of a RAR archive using the RAR filter assembly language☆23Updated 10 years ago
- Formation Angular (niveau débutant) - Angular training (beginner level)☆10Updated 3 months ago
- ☆17Updated last year
- Backscatter and Crosstalk related Side Channel Attacks in modern Optical Networks.☆11Updated last year
- Upload external IP so you can find your devices elsewhere☆16Updated last year
- Warning! Don't run this code on your computer.☆15Updated 6 years ago
- Hardware Accelerated Cold-Boot Attacks☆12Updated 8 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆21Updated 3 years ago
- It is a script written in Python that performs brute force on workers' payroll files through the use of their DNI (National Identity Docu…☆12Updated 4 years ago
- Maltego integration of https://abusix.com☆17Updated 6 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- A mod to add much more powerful endgame weaponry and defences, to stand up to mods like Natural Evolution and DyTech.☆11Updated last year
- A Burp extension for generic extraction and reuse of data within HTTP requests and responses.☆8Updated 3 years ago
- Network based steganography based control channels and chat.☆8Updated 9 years ago
- Developper-proof prevention of SQL injection (java library)☆11Updated 4 years ago
- Coding challenge for front-end developers☆12Updated last year
- ☆13Updated 5 years ago
- Email Cyber Hygiene, Trustworthy Email, and HTTPS reports to the appropriate technical or distribution addresses☆13Updated 2 months ago
- Browser History Histogram -- module for the Autopsy Forensic Browser☆11Updated 5 years ago
- Collections of way to evade normal detection events.☆25Updated 4 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆14Updated 4 years ago
- Ultimaker 2/2+ firmware with extruder fan control + interposer board☆10Updated 5 years ago
- Remove Offensive and Profane Words from Wordlists☆15Updated last year
- Script to create Onion Mirror for Clearnet site based on Enterprise Onion Toolkit☆15Updated 3 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- Containing vulnerabilities I've discovered and maybe CVE☆18Updated 2 years ago
- Another random blog about security☆9Updated last month
- Ransomware for demonstration☆17Updated 2 years ago
- Cryptanalysis and attack library☆22Updated 3 years ago
- Slides from Public Talks☆18Updated 3 years ago