Mnemonic Cryptography
☆18Nov 11, 2022Updated 3 years ago
Alternatives and similar repositories for Mnemonic
Users that are interested in Mnemonic are comparing it to the libraries listed below
Sorting:
- Exploits for the TryHackMe room hackerNote☆32Feb 20, 2020Updated 6 years ago
- Send arp packet using rust libpnet☆10Apr 24, 2017Updated 8 years ago
- Bypassing File Upload Restriction using Magic Bytes☆22Jul 4, 2022Updated 3 years ago
- Ray-casting game for wasting productive time.☆11May 23, 2021Updated 4 years ago
- Bunkrr uploader supporting parallel uploads☆13May 7, 2025Updated 10 months ago
- Research on the Lenovo BIOS firmware.☆14Feb 28, 2021Updated 5 years ago
- Keycloak admin API allows low privilege users to use administrative functions☆28Oct 12, 2024Updated last year
- An archive of the challenges found in the Blackhat MEA 2024 Qualifiers CTF☆11Sep 2, 2024Updated last year
- Bypass TPM and SecureBoot Check in Windows 11 Installation.☆11Mar 9, 2023Updated 3 years ago
- CVE-2017-8917 - SQL injection Vulnerability Exploit in Joomla 3.7.0☆67Mar 7, 2022Updated 4 years ago
- ☆11Jun 20, 2021Updated 4 years ago
- A small experiment on doing all of the font rendering inside of the WASM module without depending on font rendering capabilities of the b…☆19Apr 30, 2022Updated 3 years ago
- get yo self roasted☆23Dec 7, 2024Updated last year
- Sample code material for BoF exploit training☆10May 12, 2020Updated 5 years ago
- ☆14Jun 29, 2023Updated 2 years ago
- This repository provides information regarding a mini CSS framework aimed to display isometric cubes.☆14May 22, 2021Updated 4 years ago
- linux debugger☆11Sep 29, 2023Updated 2 years ago
- NoiceGRUB is a collection of linear gradient based GRUB2 themes that can be customised.☆19May 17, 2024Updated last year
- Simple Assault cube external hack written in C☆13Apr 26, 2021Updated 4 years ago
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- Pure Python standard library JSON 🦄☆14Apr 29, 2024Updated last year
- Hook system calls on Windows by using Kaspersky's hypervisor☆17Dec 25, 2024Updated last year
- Challenges for the TheManyHatsClub CTF☆11May 1, 2023Updated 2 years ago
- Restful Api developed with Flask using Prometheus and Grafana for monitoring and containerization with Docker☆16Jul 13, 2023Updated 2 years ago
- Return domains in CSP headers in http response☆16Aug 17, 2021Updated 4 years ago
- ☆15Oct 27, 2021Updated 4 years ago
- WiFi Scanner and Default WPS PIN Generator for Livebox 2.1 and Lievbox Next from Orange (Spain)☆22Oct 5, 2021Updated 4 years ago
- 42 header for neovim made with lua☆11Aug 17, 2022Updated 3 years ago
- Open Redirect scanner☆18May 20, 2022Updated 3 years ago
- Trolling Keyloggers by Forcing them to log Specific Text then freezing them☆22Jul 30, 2022Updated 3 years ago
- The dining philosophers problem is an example problem often used in concurrent algorithm design to illustrate synchronization issues and …☆12Aug 30, 2021Updated 4 years ago
- This is Visual C# code that will create a new user named "mcfatty" when run as a service.☆30Oct 4, 2018Updated 7 years ago
- PoC of Imagemagick's Arbitrary File Read☆13Jul 3, 2023Updated 2 years ago
- face detection using classical Viola-Jones method☆16May 3, 2017Updated 8 years ago
- CTFs solve scripts☆20Jan 9, 2026Updated 2 months ago
- little helping scripts that I use daily☆11Aug 30, 2021Updated 4 years ago
- virus collection source code☆16Aug 18, 2019Updated 6 years ago
- AI-Powered Web Attack Surface Enumeration☆34Feb 5, 2026Updated last month
- ☆28Feb 6, 2024Updated 2 years ago