Malwareman007 / x64-DSA-Assembly
An x64 assembly implementation of essential data structures and algorithms for DSA.
☆14Updated last year
Alternatives and similar repositories for x64-DSA-Assembly
Users that are interested in x64-DSA-Assembly are comparing it to the libraries listed below
Sorting:
- Movie Recommendation System based on machine learning concepts☆10Updated last year
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Updated 4 years ago
- Personal notes☆10Updated 2 years ago
- This is working POC of CVE-2022-36271☆9Updated 2 years ago
- POC OF CVE-2022-21970☆14Updated 2 years ago
- Some basic info, resources, and code snippets about windows kernel exploitation☆10Updated 2 years ago
- A cyber security oriented interpreted programming language designed to make your experience with cyber security (offensive and defensive)…☆18Updated last year
- 「🚪」The hidden hookless backdoor☆12Updated 5 months ago
- Priv8 Tools Software Mass Dork Auto Exploit.☆13Updated 2 years ago
- Remote Code Execution on Confluence Servers : CVE-2021-26084☆9Updated 2 years ago
- Trolling Keyloggers by Forcing them to log Specific Text then freezing them☆20Updated 2 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Updated 3 years ago
- convert secret patterns to gf compatible.☆39Updated 2 years ago
- ☆19Updated last year
- ZTE F660 Routers Authentication Bypass Leading to RCE.☆18Updated last year
- My attempt to teach others about microprocessors and programming in IA-32 and IA-64 assembly, and to spread the word of how awesome it is…☆29Updated 2 years ago
- Command-line tool to enumerate top-level domains, check response codes and find potential vulnerabilities for bug bounty hunters and secu…☆26Updated 2 years ago
- Lucifer is a RAT (Remote Administrator Trojan) Generator for Windows/Linux systems written in Python.☆19Updated 2 years ago
- 「💻」Simple kernel made in 16-bit assembly only☆16Updated 5 months ago
- Small python or powershell script to look for potential subdomain takeover vulnerabilities via vulnerable Alias.☆8Updated 3 years ago
- ☆12Updated 10 months ago
- Based on the Shodan API, it displays the open ports and security vulnerabilities of the server related to the entered ip or hostname.☆16Updated 4 years ago
- ☆16Updated last year
- Remote Code Execution EJS Web Applications using express-fileupload☆12Updated 3 years ago
- Exploit for elevation of privilege vulnerability in QuickHeal's Seqrite EPS (CVE-2023-31497).☆18Updated last year
- RDPloit - A Simple Security Vulnerabilities Checker For Remote Desktop Protocol☆31Updated 4 years ago
- Pentesting notes☆17Updated 2 months ago
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆14Updated 2 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆12Updated 3 years ago
- BurpSuite Extension for performing scan via CLI.☆11Updated 7 years ago