书籍《How to Hack Like a Pornstar》2019中文翻译版
☆31Jul 23, 2019Updated 6 years ago
Alternatives and similar repositories for How-to-Hack-Like-a-Pornstar
Users that are interested in How-to-Hack-Like-a-Pornstar are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more.☆91Feb 18, 2019Updated 7 years ago
- OPNsense官方文档验证翻译☆13Jul 2, 2019Updated 6 years ago
- IDA PRO FLIRT signature files MSVC2017的sig文件☆14Apr 9, 2019Updated 6 years ago
- Jsp Decoder Source Code☆16Mar 23, 2021Updated 5 years ago
- Docker + CVE-2015-2925 = escaping from --volume☆11Jun 30, 2015Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- idc脚本, IDAPython脚本, ida插件等.☆23Jun 3, 2022Updated 3 years ago
- 搜索几个网站的云盘资源,并过滤到失效链接,最后不保证资源的有效性☆20Jun 25, 2018Updated 7 years ago
- cobalt strike 自用脚本☆29Oct 29, 2020Updated 5 years ago
- To store some CTF_reverse_bins and scripts☆11Nov 17, 2019Updated 6 years ago
- homemade-CTF-challenges☆23Oct 25, 2017Updated 8 years ago
- weblogic绕过和wls远程执行☆36Jun 15, 2019Updated 6 years ago
- ☆11Jan 11, 2026Updated 2 months ago
- 通过内存特征检测frida☆10Nov 5, 2019Updated 6 years ago
- A tool for adding new lines to files, skipping duplicates and written in Rust!☆19May 8, 2025Updated 10 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- My ctf-writeups☆12Jan 28, 2019Updated 7 years ago
- Dice CTF 2022 breach write-up☆15Feb 14, 2022Updated 4 years ago
- CVE-2018-6546-Exploit☆41Apr 15, 2018Updated 7 years ago
- Windows file stream util tool☆22Apr 8, 2013Updated 12 years ago
- My blog☆73May 4, 2022Updated 3 years ago
- 一款适用于iOS的隐私合规检测工具☆17Feb 25, 2024Updated 2 years ago
- ☆22Aug 25, 2022Updated 3 years ago
- Leak windows system info through a docx file☆12Feb 23, 2020Updated 6 years ago
- One CTF Platform☆20Dec 4, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Frida uses libunwind for generating backtraces on some platforms☆17Jun 22, 2024Updated last year
- Re-codesigning tool for iOS ipa file☆11Dec 31, 2012Updated 13 years ago
- ☆15Feb 5, 2022Updated 4 years ago
- Microsoft MSHTML Remote Code Execution Vulnerability CVE-2021-40444☆16Sep 29, 2021Updated 4 years ago
- An analyzer of JNI code that matches native code information with Java code☆23Nov 12, 2021Updated 4 years ago
- Reverse-engineer a Dockerfile from a Docker image.☆15Nov 7, 2023Updated 2 years ago
- Python3 Reverse Shell☆13May 24, 2019Updated 6 years ago
- Some scripts that improve productivity☆33Dec 8, 2022Updated 3 years ago
- Red Team Tools for Emulated Adversary Techniques with MITRE ATT&CK☆31Sep 21, 2020Updated 5 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆17Feb 20, 2020Updated 6 years ago
- 用来存储Cheetah的脚本文件☆12Mar 31, 2021Updated 4 years ago
- 一个基于Rust开发,调用大模型接口完成任务流的工具☆17Sep 8, 2024Updated last year
- 感染PE文件的病毒学习过程☆32Jan 14, 2021Updated 5 years ago
- Convert WebAssembly binaries to decompilable ELF non-executables☆14Jul 27, 2023Updated 2 years ago
- A js encode/decode simple tool for XSS☆28Nov 27, 2019Updated 6 years ago
- Desktop pojie 存根☆10Aug 31, 2019Updated 6 years ago