IRC Bot Toolkit for PowerShell
☆13Apr 1, 2019Updated 6 years ago
Alternatives and similar repositories for Run-IrcBot
Users that are interested in Run-IrcBot are comparing it to the libraries listed below
Sorting:
- A Golang Implementation of a non-interactive Schnorr ZKP over Elliptic Curves☆10Sep 1, 2019Updated 6 years ago
- Haja to Ocean: machine learning with OrbitDB & Ocean Protocol. By Outlier Ventures Labs.☆11Dec 9, 2022Updated 3 years ago
- A Simple CLI App to mark all EXCEL sheets visible (i.e. sets "Very Hidden" and "Hidden" to "Visible")☆11Apr 16, 2020Updated 5 years ago
- Atomic Red Team Simple Parser☆13Sep 21, 2018Updated 7 years ago
- Build your own threat hunting maturity model☆11Oct 29, 2017Updated 8 years ago
- A tool is used to infected a shellcode to PE file, the shellcode is packed at compile time and unpacked at runtime☆13Jul 16, 2020Updated 5 years ago
- Zero Knowledge proof for point doubling on baby JubJub elliptic curve, using Zokrates☆12Nov 20, 2018Updated 7 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Aug 1, 2020Updated 5 years ago
- ☆13Apr 17, 2018Updated 7 years ago
- 👽 Exploits written for research purposes.☆11Nov 15, 2021Updated 4 years ago
- API hashing written in C to load APIs indirectly using CRC32 hashing☆15Jul 27, 2020Updated 5 years ago
- Python API and REST API for the Checkmarx WSDL☆13Feb 11, 2016Updated 10 years ago
- Python tools for Quantum AI Crypt☆12Sep 21, 2019Updated 6 years ago
- This was a pure-Rust implementation of a rangeproof scheme. It is now obsoleted by Bulletproofs.☆16Jul 24, 2018Updated 7 years ago
- Miscellaneous old Exploit code and PoCs☆16Oct 1, 2024Updated last year
- Materials for AWS Training☆15Jul 21, 2021Updated 4 years ago
- Proof of Concept of TrustZone exploit☆16Aug 10, 2025Updated 6 months ago
- orbit-db visualization☆11Jun 8, 2016Updated 9 years ago
- Quick tool for using Hybrid Analysis API on command line..☆17Dec 20, 2017Updated 8 years ago
- labs for binary exploitation☆13Jul 16, 2019Updated 6 years ago
- IDA Pro loader module for Infineon/Intel-based iPhone baseband firmwares☆25Apr 19, 2012Updated 13 years ago
- phpweb 前台任意文件上传☆16Jan 9, 2020Updated 6 years ago
- My take on the Win10 Task Cleaner UAC bypass.☆19Mar 14, 2019Updated 6 years ago
- Pulse Secure VPN mitm Research - CVE-2020-8241, CVE-2020-8239☆24Nov 1, 2020Updated 5 years ago
- ☆18Sep 13, 2021Updated 4 years ago
- A simple threaded password bruteforce tool against Wordpress installations with XML-RPC enabled. The tool exploits the system.multicall f…☆19Dec 31, 2015Updated 10 years ago
- CVE-2020-10199 CVE-2020-10204 Python POC☆19Apr 7, 2020Updated 5 years ago
- ☆20Jan 24, 2022Updated 4 years ago
- ☆14Mar 9, 2020Updated 5 years ago
- List of Red Team Repositories☆17Feb 26, 2019Updated 7 years ago
- CVE-2018-4330 POC for iOS☆17Sep 13, 2018Updated 7 years ago
- keynote I gave at GreHack 2019☆19Nov 17, 2019Updated 6 years ago
- ☆17May 13, 2019Updated 6 years ago
- java web 压缩文件 安全 漏洞☆20Mar 17, 2020Updated 5 years ago
- miscellaneous stuff☆21Mar 31, 2015Updated 10 years ago
- SUB/PUSH/POP based ASCII shellcode encoder☆23Sep 7, 2017Updated 8 years ago
- Plugin for Frida in Binary Ninja☆27May 19, 2021Updated 4 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆28Dec 25, 2018Updated 7 years ago
- CVE-2020-1958 PoC☆22Apr 11, 2020Updated 5 years ago