PostScript examples useful for attacking Ghostscript.
☆12Aug 1, 2024Updated last year
Alternatives and similar repositories for postscript_blog_examples
Users that are interested in postscript_blog_examples are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Results from analyzing data gathered from 1.6 billion subdomains☆32Oct 15, 2024Updated last year
- A simple Raspberry Pi Pico W based espresso machine controller design with support for SSR, digital dimmer, flow rate, async web UI, and …☆17Jan 22, 2025Updated last year
- Vacuum cleaner robot algorithm implemented in Python☆12May 9, 2019Updated 6 years ago
- CVE-2021-22192☆13Apr 28, 2021Updated 4 years ago
- ☆170Oct 4, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆20Jul 19, 2021Updated 4 years ago
- wall of sheep for security training;☆26Sep 5, 2017Updated 8 years ago
- Command line program which computes planetary positions☆22Jan 20, 2016Updated 10 years ago
- A collection of IPA files from many different sources, for TrollStore! (Forked so this can become a DEB collection instead of an IPA coll…☆26Mar 16, 2024Updated 2 years ago
- ☆15Dec 29, 2024Updated last year
- BFC5.5.10mp1 eCos open source for TC7210/TC7230 models☆24Dec 7, 2015Updated 10 years ago
- Tools for fast matched Ex0 pattern in huge log files☆26Sep 30, 2022Updated 3 years ago
- Python script that converts Grafana hash digests to PBKDF2_HMAC_SHA256 format in order to facilitate password cracking using Hashcat.☆26Oct 24, 2021Updated 4 years ago
- 🐛 A list of writeups from the MSRC (Microsoft) Bug Bounty program☆31Oct 29, 2025Updated 5 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆102May 5, 2020Updated 5 years ago
- ☆10Feb 8, 2024Updated 2 years ago
- Tracks a range of Microsoft owned ASNs and publishes a daily release containing a list of IPv4 and IPv6 address in CIDR notation.☆31Mar 22, 2026Updated last week
- Launch your SOC as fast as a rocket with only one command☆12Feb 17, 2025Updated last year
- This module configures the chrome flag --ignore-certificate-errors-spki-list, this bypasses the NET::ERR_CERTIFICATE_TRANSPARENCY_REQUIRE…☆35Oct 25, 2022Updated 3 years ago
- Custom / Experimental CodeQL queries☆36Apr 21, 2022Updated 3 years ago
- POC for CVE-2020-9484☆13Feb 10, 2021Updated 5 years ago
- A Burpsuite extension written in Python to perform basic validation fuzzing☆11Oct 7, 2022Updated 3 years ago
- Not a Linux utility for the AJAZZ AK33 RGB keyboard☆42Jan 3, 2019Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- The "code" for squarectf.com☆13Jan 22, 2025Updated last year
- Hackfest Talk - Abusing PHP 7’s OPcache to Spawn Webshells☆10Nov 6, 2016Updated 9 years ago
- Advent Calendar CTF 2014☆10Nov 4, 2015Updated 10 years ago
- The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security development, testing and reverse engineering.☆11Apr 6, 2020Updated 5 years ago
- Collection of rules for Static Application Security Testing (SAST) with Semgrep☆12Apr 16, 2025Updated 11 months ago
- Small tool to run reverse IP lookup for given IP, IP range or IP list☆13Jan 2, 2020Updated 6 years ago
- CTF collaboration tool for teams☆10Nov 10, 2017Updated 8 years ago
- virustotal API-based project for checking the list of hashes against virustotal.com database☆11Feb 26, 2018Updated 8 years ago
- Burp plugin for jxscout☆20May 12, 2025Updated 10 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Run GTK GUI apps with docker☆13Jul 13, 2023Updated 2 years ago
- Clear and obvious name of the exploitation technique can create a false sense of familiarity, even if its true potential was never resear…☆96Feb 22, 2026Updated last month
- A multithreaded, queued SSH key and/or password spraying tool.☆20Jan 5, 2023Updated 3 years ago
- Some research on UXSS vulnerabilities in web browsers☆12May 14, 2018Updated 7 years ago
- Another pentest of a vulnerable windows server☆15Sep 17, 2021Updated 4 years ago
- Test your javascript knowledge☆12Jan 10, 2018Updated 8 years ago
- Reverse Shell-able Windows exploits short POCs.☆35Sep 28, 2020Updated 5 years ago