☆28Mar 22, 2013Updated 12 years ago
Alternatives and similar repositories for haxe
Users that are interested in haxe are comparing it to the libraries listed below
Sorting:
- Networking exploration in golang to build a security enhanced version of netcat☆10Feb 20, 2018Updated 8 years ago
- A collection of shellcodes☆70May 17, 2012Updated 13 years ago
- ☆14Apr 28, 2016Updated 9 years ago
- CTF writeups☆18Oct 19, 2023Updated 2 years ago
- This demonstrates the hijacking of the "write" system call and how to set the System Call table to read/write mode via modifying the corr…☆19Jun 2, 2014Updated 11 years ago
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Oct 31, 2017Updated 8 years ago
- Run commands on linux through those pesky firewalls☆30Jul 21, 2015Updated 10 years ago
- An educational Linux Kernel Rootkit☆33Oct 3, 2021Updated 4 years ago
- MemcacheD Proof of Concept☆22Mar 6, 2018Updated 7 years ago
- (DOM-)XSS fuzzer based on phantomjs and go.☆34Dec 18, 2014Updated 11 years ago
- Numerous fork bombs in popular programming langs ...☆10May 25, 2017Updated 8 years ago
- MATLAB Implementation of Harmony Search, a nature inspired optimization algorithm☆10Dec 1, 2016Updated 9 years ago
- A wireless playground using mac80211 hwsim devices and docker containers.☆10May 19, 2023Updated 2 years ago
- MIDI Synthesizer for Arduino☆10Dec 7, 2015Updated 10 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- Eclipse plugin suite providing integration with security testing tools.☆11Apr 23, 2016Updated 9 years ago
- A php client for using the Weebly Cloud API☆10Dec 4, 2020Updated 5 years ago
- Block-based software vulnerability fuzzing framework☆49Dec 22, 2018Updated 7 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Feb 15, 2019Updated 7 years ago
- Writeups for Google CTF challenges 2017☆10Jun 19, 2017Updated 8 years ago
- Tool used for converting Linux Kernel time jiffies, from iptables xt_recent timestamps, to human datetime☆13Feb 16, 2021Updated 5 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- [BASH] Password generator through a wordlist☆12Mar 15, 2013Updated 12 years ago
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 8 years ago
- MMORPG server emulator☆12Aug 26, 2018Updated 7 years ago
- PANDA-powered tracing engine for tenet☆11Apr 7, 2022Updated 3 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- GDB scripts☆14Nov 30, 2012Updated 13 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- Git repository to browse the XNU releases from☆10Sep 20, 2021Updated 4 years ago
- Portable C Compiler (CVS mirror)☆12Apr 9, 2012Updated 13 years ago
- Build your own complete XNU kernel header set, replaces Kernel.framework. Gain access to kernel private structures and symbols etc with I…☆13Jun 21, 2018Updated 7 years ago
- Tool for decrypting files encrypted by the SynoLocker ransomware☆15Aug 22, 2014Updated 11 years ago
- Scan IPv4 prefixes for DNS revolvers and classify them as open/closed☆10Jun 19, 2014Updated 11 years ago
- Photo forensics tool that detects alteration of JPEG images☆10May 13, 2021Updated 4 years ago
- Evil maid attacks are the biggest threat to full disk encryption, if you can't provide 100% physical security. It's not about locking you…☆11Sep 4, 2016Updated 9 years ago
- A "custom" layer 4 protocol for raw socket communication on linux. Golang library.☆10Dec 20, 2018Updated 7 years ago