SDL2 wrapper in C
☆17May 3, 2022Updated 3 years ago
Alternatives and similar repositories for SANDAL2
Users that are interested in SANDAL2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Jul 13, 2023Updated 2 years ago
- A training course on Web Security, Exploit Development and Source Code Auditing from 2009.☆12Feb 15, 2022Updated 4 years ago
- ☆13Mar 12, 2022Updated 4 years ago
- ☆20Sep 6, 2023Updated 2 years ago
- 🎨 A simple, yet feature rich color picker and manipulator☆19Aug 1, 2020Updated 5 years ago
- Service-Now Article Bruteforcer☆16Jun 5, 2020Updated 5 years ago
- Important notes for oswe exam prepration. Challenges faces during oswe exam prepration.☆17Jan 14, 2020Updated 6 years ago
- ☆23Mar 3, 2020Updated 6 years ago
- Demo of the URLClassLoader JAR-swapping showing the ability to replace and exploit an already loaded JAR with inner classes☆32Dec 10, 2022Updated 3 years ago
- Juju charm to deploy and scale Jenkins☆20Jul 22, 2024Updated last year
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆37Mar 4, 2025Updated last year
- Tools and our test data developed for the HackAPrompt 2023 competition☆47Oct 20, 2023Updated 2 years ago
- A demo PHP application used to exercise SQL injection techniques in a safe, local Docker environment☆45Jun 3, 2024Updated last year
- A GO module to get domain name from SSL certificates when an IP address is provided.☆33Apr 14, 2023Updated 2 years ago
- The Outlook HTML Leak Test Project☆41May 12, 2018Updated 7 years ago
- Automatic SQL injection and database takeover tool☆45Nov 27, 2025Updated 3 months ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Mar 2, 2020Updated 6 years ago
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆55Apr 27, 2023Updated 2 years ago
- Implementation of the SYCL specification.☆66Jun 19, 2024Updated last year
- This repo includes my analysis of some public reports.☆55Sep 22, 2020Updated 5 years ago
- Curated list of Meta (formerly Facebook) owned IT assets☆56Jul 20, 2025Updated 8 months ago
- A prototype implementation of the executors proposal☆87Feb 8, 2019Updated 7 years ago
- DNS and Target HTTP History Local Storage and Search☆63Feb 14, 2021Updated 5 years ago
- Collection of Bug Bounty Tips☆65Dec 10, 2019Updated 6 years ago
- ☆76Nov 30, 2020Updated 5 years ago
- Find subdomains and takeovers.☆87Dec 2, 2022Updated 3 years ago
- Detectify Crowdsource Challenge☆72Apr 26, 2022Updated 3 years ago
- OpenCL specific C++ libraries implemented in C++ for OpenCL kernel language published in releases of OpenCL-Docs☆123Mar 6, 2023Updated 3 years ago
- Read-only mirror of https://gitlab.gnome.org/GNOME/vte☆197Mar 14, 2026Updated last week
- 🔭 Collection of regexp pattern for security passive scanning☆116Feb 18, 2023Updated 3 years ago
- For pentesters who don't wanna leave their terminals.☆183Aug 27, 2021Updated 4 years ago
- PostMessage extension☆102Aug 28, 2019Updated 6 years ago
- a practical introduction to Go☆104Feb 3, 2026Updated last month
- Nuclei Templates to reproduce Cracking the lens's Research☆130Jan 8, 2022Updated 4 years ago
- A path-normalization pentesting tool.☆153Jan 22, 2026Updated 2 months ago
- ☆154Aug 18, 2023Updated 2 years ago
- ☆148Dec 23, 2022Updated 3 years ago
- Unsecure time-based secret exploitation and Sandwich attack implementation Resources☆148Dec 9, 2024Updated last year
- ☆150Nov 27, 2021Updated 4 years ago