Mnemonic Cryptography
☆18Nov 11, 2022Updated 3 years ago
Alternatives and similar repositories for Mnemonic
Users that are interested in Mnemonic are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exploits for the TryHackMe room hackerNote☆33Feb 20, 2020Updated 6 years ago
- ActiveMQ_putshell直接获取webshell☆15Aug 1, 2020Updated 5 years ago
- RCE on Kibana versions before 5.6.15 and 6.6.0 in the Timelion visualizer☆56Dec 20, 2019Updated 6 years ago
- Send arp packet using rust libpnet☆10Apr 24, 2017Updated 9 years ago
- Bypassing File Upload Restriction using Magic Bytes☆22Jul 4, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- Research on the Lenovo BIOS firmware.☆14Feb 28, 2021Updated 5 years ago
- Keycloak admin API allows low privilege users to use administrative functions☆29Oct 12, 2024Updated last year
- Proof of Concept for CVE-2019-18634☆238Sep 12, 2021Updated 4 years ago
- An archive of the challenges found in the Blackhat MEA 2024 Qualifiers CTF☆11Sep 2, 2024Updated last year
- CVE-2017-8917 - SQL injection Vulnerability Exploit in Joomla 3.7.0☆67Mar 7, 2022Updated 4 years ago
- Mass exploitation of CVE-2021-24499 unauthenticated upload leading to remote code execution in Workreap theme.☆16Sep 20, 2021Updated 4 years ago
- ☆14Jun 29, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆15Sep 27, 2024Updated last year
- linux debugger☆11Sep 29, 2023Updated 2 years ago
- Simple Assault cube external hack written in C☆13Apr 26, 2021Updated 5 years ago
- This is a exploit of CVE-2022-46169 to cacti 1.2.22. This exploit allows through an RCE to obtain a reverse shell on your computer.☆41Sep 11, 2023Updated 2 years ago
- Pure Python standard library JSON 🦄☆14Apr 29, 2024Updated 2 years ago
- Rust bindings for liboping, a simple ICMP ping library.☆17Jun 19, 2020Updated 5 years ago
- Hook system calls on Windows by using Kaspersky's hypervisor☆17Dec 25, 2024Updated last year
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆14Dec 26, 2025Updated 4 months ago
- Challenges for the TheManyHatsClub CTF☆11May 1, 2023Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Ressources for following my youtube C tutorials☆13Jun 25, 2021Updated 4 years ago
- Restful Api developed with Flask using Prometheus and Grafana for monitoring and containerization with Docker☆16Jul 13, 2023Updated 2 years ago
- Return domains in CSP headers in http response☆16Aug 17, 2021Updated 4 years ago
- WiFi Scanner and Default WPS PIN Generator for Livebox 2.1 and Lievbox Next from Orange (Spain)☆24Oct 5, 2021Updated 4 years ago
- Trolling Keyloggers by Forcing them to log Specific Text then freezing them☆22Jul 30, 2022Updated 3 years ago
- Attack/Defense services for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆14Oct 24, 2024Updated last year
- The dining philosophers problem is an example problem often used in concurrent algorithm design to illustrate synchronization issues and …☆12Aug 30, 2021Updated 4 years ago
- YAMPA is Yet Another Mitm Proxy for use in A/D CTFs☆16Jul 11, 2024Updated last year
- 👥 Sorting powered by human intelligence☆18Jul 24, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- PoC of Imagemagick's Arbitrary File Read☆13Jul 3, 2023Updated 2 years ago
- :)☆10Mar 18, 2023Updated 3 years ago
- face detection using classical Viola-Jones method☆16May 3, 2017Updated 9 years ago
- CTFs solve scripts☆19Jan 9, 2026Updated 4 months ago
- virus collection source code☆16Aug 18, 2019Updated 6 years ago
- ☆28Feb 6, 2024Updated 2 years ago
- BTK Akademi Siber Güvenlik Operasyonları Eğitimi Materyalleri☆17Jun 5, 2024Updated last year