☆24Apr 13, 2023Updated 2 years ago
Alternatives and similar repositories for BreakMi
Users that are interested in BreakMi are comparing it to the libraries listed below
Sorting:
- 2019 and 2020 Top Conference Paper☆12Apr 19, 2021Updated 4 years ago
- SyzTrust's main repository. Start here to install.☆19Feb 29, 2024Updated 2 years ago
- Oasis is a lightweight modular framework allowing to easily write, build and patch instrumentation modules for Bluetooth Low Energy (BLE)…☆20Dec 5, 2023Updated 2 years ago
- Wireshark dissector for Broadcom specific H4 diagnostic commands☆25Jan 6, 2023Updated 3 years ago
- Additional active scan checks for BURP☆28Oct 3, 2024Updated last year
- Electron-Probe leverages the Node variant of the Chrome Debugging Protocol to execute JavaScript payloads inside of target Electron appli…☆31Jan 13, 2026Updated last month
- Jupyter Notebook Praktikum Projects. This is repository with data analyst educational projects from Yandex.Praktikum.☆11Feb 21, 2021Updated 5 years ago
- SD/MMC Analyzer for Saleae Logic☆39Mar 18, 2024Updated last year
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- ☆10Nov 14, 2022Updated 3 years ago
- Generate cross-platform sound intimations, push notifications and get a telegram message when a process execution is finished in the clou…☆16Feb 24, 2023Updated 3 years ago
- C64 playroutine identity scanner☆14Jan 9, 2026Updated last month
- ☆10May 12, 2022Updated 3 years ago
- GIAnT, the Generic Implementation ANalysis Toolkit☆12Jul 4, 2018Updated 7 years ago
- A secrets manager in times of crypto coins.☆11Dec 22, 2025Updated 2 months ago
- A tool for monitoring the progress of data through a pipe.☆12Oct 31, 2025Updated 4 months ago
- Some literature published on topics around IoT & Cybersecurity☆13Oct 13, 2025Updated 4 months ago
- Show Window proxy settings☆16Oct 19, 2016Updated 9 years ago
- ☆11Jan 22, 2021Updated 5 years ago
- A dnSpyEx extension for DotNet Universal Patcher.☆12Nov 24, 2023Updated 2 years ago
- This AppEngine sample application is designed to process your Waze CCP JSON Feed into; BigQuery GIS tables for analysis, Google Cloud Sto…☆11Dec 12, 2023Updated 2 years ago
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- AGS Tool for translating games writen on Adventure Game Studio engine.☆12May 4, 2018Updated 7 years ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Nov 28, 2025Updated 3 months ago
- Virtual CAC using libcacard, virtualsmartcard's vpcd and softhsm2 to provide PCSC accessible virtual smart card.☆12Feb 19, 2022Updated 4 years ago
- Some useful scripts written for PowerShell and cmd☆12Jun 19, 2015Updated 10 years ago
- Kentico <=12.0.14 is vulnerable to a remote code execution via the SyncServer☆10Sep 28, 2020Updated 5 years ago
- ☆10Nov 8, 2019Updated 6 years ago
- Offensive tool for guessing Active Directory credentials via Kerberos☆10Jan 1, 2024Updated 2 years ago
- A quick'n'dirty static deobfuscator for TNT team x86_64 crack library☆21Apr 1, 2025Updated 11 months ago
- Build your own cloud virtual machine lab☆12Nov 25, 2025Updated 3 months ago
- YARA detection rule for CVE-2024-4367 arbitrary javascript execution in PDF.js☆11May 27, 2024Updated last year
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- ☆11Dec 26, 2023Updated 2 years ago
- Russian plate recognition system (mobile application)☆17Jun 30, 2014Updated 11 years ago
- Creating a NIDS based on a Deep Neural Network (CNN)☆11Dec 31, 2018Updated 7 years ago
- A super dope tool, that generates "corrupted" .PDF files of randomly unique file sizes (no two files of the same size or byte combination…☆14Oct 12, 2021Updated 4 years ago
- ☆11Dec 19, 2024Updated last year
- ☆13Nov 30, 2023Updated 2 years ago