LOL's collections
☆24Oct 4, 2020Updated 5 years ago
Alternatives and similar repositories for LOL-Bin
Users that are interested in LOL-Bin are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Free Course Materials for LOL-Pwn☆21May 29, 2020Updated 5 years ago
- ☆15Sep 11, 2020Updated 5 years ago
- Everything you see on my tutorials is here in this repo☆10Jun 19, 2017Updated 8 years ago
- 🚧 Bypass Android SSL Pinning with ProxyMan and Frida☆32Aug 1, 2024Updated last year
- experimenting w/ apple script for various macOS functionality☆14Aug 4, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Python client for Assemblyline 3 and 4 / Client python pour AssemblyLine 3 and 4☆23Feb 24, 2026Updated last month
- Kali Linux Cheat Sheet for Penetration Testers☆14Jun 19, 2017Updated 8 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010 AKA EternalBlue☆12Dec 31, 2018Updated 7 years ago
- Quick & Dirty DFIR scripts developed by Ebryx DFIR team to keep handy during field assignment☆14Jan 7, 2026Updated 3 months ago
- Incident Response Playbooks☆15Jun 10, 2019Updated 6 years ago
- personal redirect server☆17Aug 11, 2016Updated 9 years ago
- My (newer) Emacs configuration☆14Sep 14, 2025Updated 7 months ago
- ☆17Nov 2, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Write ups of solution for CTF challenges I solved☆25Jul 20, 2021Updated 4 years ago
- ☆22Jul 13, 2022Updated 3 years ago
- Source files and writeups for UTCTF 2019☆14Oct 21, 2020Updated 5 years ago
- Best practices in threat intelligence☆50Nov 6, 2022Updated 3 years ago
- Awesome Data Sanitization☆12Jun 6, 2021Updated 4 years ago
- Hunting Newly Registered Domains☆10Jan 6, 2019Updated 7 years ago
- PostScript web server☆23Sep 5, 2012Updated 13 years ago
- Scripts I use to setup a new macOS or Linux machine for iOS research☆17Feb 24, 2019Updated 7 years ago
- Exercises for the O'Reilly Live Training, AWS Cloud Practitioner Essentials☆18May 6, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Calculate the domain age with python script☆11Mar 27, 2018Updated 8 years ago
- World War 2 German Enigma Encryption Machine in x86 assembly.☆16Jun 14, 2019Updated 6 years ago
- Scanner for Log4j RCE CVE-2021-44228☆11Jul 6, 2022Updated 3 years ago
- ☆10Feb 3, 2021Updated 5 years ago
- Cross-Site Scripting (XSS) vulnerability analyzer☆21Feb 13, 2026Updated 2 months ago
- ☆10Oct 12, 2021Updated 4 years ago
- OpenArk is a open source anti-rookit(Ark) tool on Windows.☆18Jul 18, 2019Updated 6 years ago
- ☆19Jun 19, 2023Updated 2 years ago
- ☆10Mar 29, 2022Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Central IoC scanner based on Loki☆20Nov 12, 2021Updated 4 years ago
- Pentesting report template for the masses☆17Apr 2, 2020Updated 6 years ago
- A talk (including sample code) about the Turing award lecture "Reflections on Trusting Trust" originally given by Ken Thompson.☆18May 2, 2018Updated 7 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆22Oct 20, 2019Updated 6 years ago
- Showcase of DNS Exfiltration and Infiltration☆60Feb 26, 2021Updated 5 years ago
- ☆16Feb 10, 2020Updated 6 years ago
- F5 BIG-IP 任意文件读取+远程命令执行RCE☆13Jul 8, 2020Updated 5 years ago