☆12Jun 20, 2020Updated 5 years ago
Alternatives and similar repositories for factorization
Users that are interested in factorization are comparing it to the libraries listed below
Sorting:
- My own diary notes. Adding the commands, tools, techniques, and resources that I will not memorize.☆15Jul 5, 2023Updated 2 years ago
- A collection of open source threat detection rules created by Cyber Castle's team.☆14Jun 2, 2022Updated 3 years ago
- The official exploit for Open-AudIT v3.3.1 Remote Code Execution CVE-2020-12078☆18Apr 28, 2020Updated 5 years ago
- Unauthenticated RCE at Woody Ad Snippets / CVE-2019-15858 (PoC)☆32Apr 25, 2023Updated 2 years ago
- A lightweight type converter python library.☆13Oct 1, 2020Updated 5 years ago
- Cobalt Strike DNS beacon parser☆11Nov 29, 2021Updated 4 years ago
- Simplified MITRE Use Cases, it describes the Attack and Detection☆49Sep 29, 2020Updated 5 years ago
- Capa analysis importer for Ghidra.☆64Dec 2, 2020Updated 5 years ago
- Firefox and Chrome compatible extension that acts as annotation tool for websites (Named Entity Recognition)☆10Feb 17, 2019Updated 7 years ago
- Get a reverse shell within 15 seconds on both Windows or Unix based systems, using the Digispark developement board.☆43Dec 9, 2020Updated 5 years ago
- A Bot for Reddit that gets top Hot sorted picture from a given Subreddit and sets it as background.☆15Dec 11, 2024Updated last year
- ☆17Dec 18, 2025Updated 3 months ago
- Purple Team Workshop by @jorgeorchilles☆12Apr 26, 2025Updated 10 months ago
- A powerful static analysis tool that uses AI to scan Android APK files for security vulnerabilities and potential issues. The scanner dec…☆27Apr 6, 2025Updated 11 months ago
- REcon 2024 Repo, slides for talk "GOP Complex: Image parsing bugs, EBC polymorphic engines and the Deus ex machina of UEFI exploit dev""☆14Mar 31, 2025Updated 11 months ago
- A collection of tools I wrote for bug bounty or hacking and don't mind publishing it☆122Oct 14, 2024Updated last year
- This repository include Docker Machines for practicing on some of the Web Attacks.☆14Nov 20, 2023Updated 2 years ago
- ☆15Dec 3, 2025Updated 3 months ago
- this zero-dependency package will provide a persistent, in-browser database, with a working web-demo☆11Aug 24, 2019Updated 6 years ago
- A HTML+CSS+JS game to learn the arabic alphabet.☆10Mar 4, 2023Updated 3 years ago
- DKMS build for missing kmod dummy_hcd in Ubuntu☆12Aug 10, 2017Updated 8 years ago
- ☆15Sep 4, 2020Updated 5 years ago
- Jupyter Notebooks for Digital Forensics & Incident Response☆10Nov 23, 2021Updated 4 years ago
- ☆10Jan 2, 2022Updated 4 years ago
- CTF challenge solutions and writeups☆11Mar 2, 2024Updated 2 years ago
- NLP on Korean news articles. Automatic topic extraction through dynamic clustering.☆12Sep 15, 2017Updated 8 years ago
- ☆13May 3, 2024Updated last year
- Gmail shell, for hackers execute commands via gmail☆19Feb 3, 2021Updated 5 years ago
- ☆15Dec 8, 2022Updated 3 years ago
- get the http allowed methods for URLs list☆13Feb 22, 2021Updated 5 years ago
- Named Entity Recognizer for Arabic☆12Nov 22, 2017Updated 8 years ago
- Telegram cli tool for bot notifications☆17Feb 24, 2021Updated 5 years ago
- Web-based Android debugger with inspection capabilities using Frida and Jadx as a backbone☆35Jun 4, 2023Updated 2 years ago
- Applied Data Science training course (for updates and resources, read the ReadMe file below)☆15Sep 9, 2023Updated 2 years ago
- DriveFS Sleuth is a Python tool that automates investigating Google Drive File Stream disk artifacts, the tool has been developed based o…☆88Dec 20, 2024Updated last year
- Get Twitter trends with twitter4j, stream it to a Kafka topic, save it to MongoDB and visualize in Google Maps☆13Sep 30, 2021Updated 4 years ago
- Proof Of Concept that exploits PuTTy CVE-2024-31497.☆11May 11, 2024Updated last year
- A JetBrains IDE plugin that integrates OpenCode — the open-source AI coding agent — directly into your development workflow.☆26Feb 8, 2026Updated last month
- wiringX for Milk-V Duo☆11Sep 24, 2024Updated last year