Game Hacking Ruby Lib
☆23Jul 8, 2021Updated 4 years ago
Alternatives and similar repositories for GHRL
Users that are interested in GHRL are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ruby ARP Toolkit☆14Apr 15, 2021Updated 4 years ago
- ☆13Nov 27, 2020Updated 5 years ago
- Syntax Highlighter for VSC☆20Feb 9, 2023Updated 3 years ago
- CodeX Tool is to Convert Phishing URL to qr code !☆16Feb 16, 2021Updated 5 years ago
- KAGSA PROGRAMMING LANGUAGE☆64Oct 16, 2023Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- DNS hijacking via dead records automation tool☆53Jan 8, 2021Updated 5 years ago
- ☆15Sep 24, 2012Updated 13 years ago
- Simple PHP script to mass deface sites on the same server☆12Sep 30, 2020Updated 5 years ago
- Sons of the forest internal cheat☆20Nov 1, 2023Updated 2 years ago
- Capture screen content with xlib in rust☆12May 22, 2017Updated 8 years ago
- Instagram Session ID Brute-forcer☆11Oct 8, 2022Updated 3 years ago
- A mix of learning resources, my notes and mostly ctf writeup of sandbox escape challenges☆10Jun 6, 2023Updated 2 years ago
- I will put my Manim animations code used for videos on my YouTube channel "MetaMaths" here.☆16Jul 30, 2022Updated 3 years ago
- Easy Telegram Bot Creater☆11Jun 17, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A shellcode crypto-packing tool for PoC (used with msfvenom payloads)☆17Feb 10, 2023Updated 3 years ago
- A lightweight x86/x64 VM☆18Feb 7, 2021Updated 5 years ago
- ☆13Apr 11, 2021Updated 4 years ago
- Bitcoin paperwallet generator by mic entropy or by webcam entropy☆19Mar 18, 2023Updated 3 years ago
- Illustrates the concept of return address spoofing, and how it is used.☆14May 13, 2020Updated 5 years ago
- Single header code that sets any section's page to No Access☆11Feb 15, 2022Updated 4 years ago
- Bypassing kernel patch protection runtime☆22Feb 19, 2023Updated 3 years ago
- A Forge 'ghost client' written in C++☆57Oct 15, 2020Updated 5 years ago
- General purpose buffer for use with building JITs☆19Oct 13, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆10Jan 30, 2022Updated 4 years ago
- hook KeyboardClassServiceCallback to prevent messing up sistema☆26Nov 14, 2023Updated 2 years ago
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆20May 3, 2024Updated last year
- My journey and notes on learning Offensive Security from the ground up☆21Dec 22, 2025Updated 3 months ago
- public archive for corCTF 2023☆18Aug 6, 2023Updated 2 years ago
- Anti-anti-debug: reset ThreadHideFromDebugger☆15Nov 25, 2021Updated 4 years ago
- Intel 64/Windows low-level experiments☆63Aug 25, 2025Updated 7 months ago
- Instagram APIs☆14Aug 16, 2022Updated 3 years ago
- secure password manager written in python !☆13Jul 21, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Some basic info, resources, and code snippets about windows kernel exploitation☆17Jul 18, 2025Updated 8 months ago
- jqctf2023☆16Dec 3, 2023Updated 2 years ago
- A Phoenix application using Elm, built with webpack.☆15Dec 23, 2015Updated 10 years ago
- C++ JSON parser and stringify☆26Jul 29, 2022Updated 3 years ago
- ☆27Jun 24, 2022Updated 3 years ago
- ☆42Sep 18, 2025Updated 6 months ago
- Janet redis bindings based on hiredis☆15Sep 13, 2022Updated 3 years ago