Spikes-2212-Programming-Guild / SpikesLib2
A library extending WPILIB with extra features, for the 2020 season onward
☆7Updated this week
Alternatives and similar repositories for SpikesLib2:
Users that are interested in SpikesLib2 are comparing it to the libraries listed below
- Java code for CFS2160 Programming Stream 2019/20☆10Updated 5 years ago
- Use to collect translations of the exp-db-papers☆9Updated 7 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆9Updated 6 years ago
- ☆13Updated 4 years ago
- Binary analysis. Capstone+Keystone+Unicorn = static and dynamic binary analysis☆12Updated 5 years ago
- Nmap results are a semigroup☆13Updated 3 years ago
- Remote Access Trojan for Chrome and Firefox. It's pretty ugly right now.☆12Updated 12 years ago
- Store and read traces in Protobuf☆19Updated last year
- ☆12Updated 6 years ago
- Decrypt Wireless Passwords On Windows☆13Updated 4 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 3 years ago
- module for certexfil☆15Updated 2 years ago
- POC code for checking for this vulnerability. Since the code has been released, I decided to release this one as well. Patch Immediately!☆12Updated 4 years ago
- An opensource API hooking framework☆21Updated 5 years ago
- Shellcode / Buffer Overflow 💣☆20Updated 4 years ago
- Auto Inject Dll , it have three method to inject your custom dll. help you to test inject.☆9Updated 8 years ago
- superstrip - strip an ELF executable of all unmapped information - David Madore / Laurent Bercot☆11Updated 7 years ago
- This repository is a clne of the new cuckoo monitor where I added some stuff to get the calling address for every hooked API☆8Updated 8 years ago
- An index which uses 'spiders' to crawl and explore every discoverable hidden service on Tor.☆9Updated 6 years ago
- Build and Interact with a Set of Virtual Machines☆15Updated 2 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 8 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆15Updated 11 years ago
- Windows Malware Probe of Concept☆21Updated 2 years ago
- A program that sends a lot of fake ARP packets to the router. This may kick everyone out of the network!☆20Updated 5 years ago
- Halium Boot Kernel for Xiaomi SDM660 devices☆11Updated last year
- Vagrant setup for building a machine for CTF/exploit development☆23Updated 5 years ago
- Linux/x86 - Egghunter Reverse TCP Shell dynamic IP and port Shellcode☆14Updated 3 years ago
- ☆45Updated 6 years ago