Mnemonic Cryptography
☆18Nov 11, 2022Updated 3 years ago
Alternatives and similar repositories for Mnemonic
Users that are interested in Mnemonic are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exploits for the TryHackMe room hackerNote☆31Feb 20, 2020Updated 6 years ago
- Bypassing File Upload Restriction using Magic Bytes☆22Jul 4, 2022Updated 3 years ago
- penetration testing utilities☆10Mar 30, 2021Updated 5 years ago
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- Research on the Lenovo BIOS firmware.☆14Feb 28, 2021Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Keycloak admin API allows low privilege users to use administrative functions☆29Oct 12, 2024Updated last year
- An archive of the challenges found in the Blackhat MEA 2024 Qualifiers CTF☆11Sep 2, 2024Updated last year
- Proof of Concept for CVE-2019-18634☆238Sep 12, 2021Updated 4 years ago
- Bypass TPM and SecureBoot Check in Windows 11 Installation.☆13Mar 9, 2023Updated 3 years ago
- CVE-2017-8917 - SQL injection Vulnerability Exploit in Joomla 3.7.0☆67Mar 7, 2022Updated 4 years ago
- A small experiment on doing all of the font rendering inside of the WASM module without depending on font rendering capabilities of the b…☆19Apr 30, 2022Updated 4 years ago
- Mass exploitation of CVE-2021-24499 unauthenticated upload leading to remote code execution in Workreap theme.☆16Sep 20, 2021Updated 4 years ago
- Sample code material for BoF exploit training☆10May 12, 2020Updated 5 years ago
- ☆15Sep 27, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- linux debugger☆11Sep 29, 2023Updated 2 years ago
- Simple Assault cube external hack written in C☆13Apr 26, 2021Updated 5 years ago
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- This is a exploit of CVE-2022-46169 to cacti 1.2.22. This exploit allows through an RCE to obtain a reverse shell on your computer.☆41Sep 11, 2023Updated 2 years ago
- Pure Python standard library JSON 🦄☆14Apr 29, 2024Updated 2 years ago
- Rust bindings for liboping, a simple ICMP ping library.☆17Jun 19, 2020Updated 5 years ago
- Hook system calls on Windows by using Kaspersky's hypervisor☆17Dec 25, 2024Updated last year
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆14Dec 26, 2025Updated 4 months ago
- Challenges for the TheManyHatsClub CTF☆11May 1, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Ressources for following my youtube C tutorials☆13Jun 25, 2021Updated 4 years ago
- Return domains in CSP headers in http response☆16Aug 17, 2021Updated 4 years ago
- WiFi Scanner and Default WPS PIN Generator for Livebox 2.1 and Lievbox Next from Orange (Spain)☆23Oct 5, 2021Updated 4 years ago
- 42 header for neovim made with lua☆11Aug 17, 2022Updated 3 years ago
- Open Redirect scanner☆18May 20, 2022Updated 3 years ago
- Trolling Keyloggers by Forcing them to log Specific Text then freezing them☆22Jul 30, 2022Updated 3 years ago
- Attack/Defense services for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆14Oct 24, 2024Updated last year
- The dining philosophers problem is an example problem often used in concurrent algorithm design to illustrate synchronization issues and …☆12Aug 30, 2021Updated 4 years ago
- YAMPA is Yet Another Mitm Proxy for use in A/D CTFs☆16Jul 11, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- 👥 Sorting powered by human intelligence☆18Jul 24, 2020Updated 5 years ago
- This is Visual C# code that will create a new user named "mcfatty" when run as a service.☆30Oct 4, 2018Updated 7 years ago
- PoC of Imagemagick's Arbitrary File Read☆13Jul 3, 2023Updated 2 years ago
- :)☆10Mar 18, 2023Updated 3 years ago
- The precursor project before the great and mighty mycvecom release!☆16Mar 3, 2025Updated last year
- little helping scripts that I use daily☆11Aug 30, 2021Updated 4 years ago
- AI-Powered Web Attack Surface Enumeration☆37Feb 5, 2026Updated 2 months ago