Hash Length Extension Attack
☆30May 12, 2021Updated 4 years ago
Alternatives and similar repositories for hexpand
Users that are interested in hexpand are comparing it to the libraries listed below
Sorting:
- A vulnerable application exposing Spring Boot Actuators☆123Feb 25, 2019Updated 7 years ago
- 苍穹 - 贴吧签到助手☆10Oct 3, 2014Updated 11 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- ☆15May 23, 2019Updated 6 years ago
- An ext for php to decode some phpjiami☆31Jun 22, 2018Updated 7 years ago
- Laravel for gnuboard☆13Feb 1, 2023Updated 3 years ago
- Joway's Gallery☆10Nov 11, 2023Updated 2 years ago
- Open Source Risk Assessment Tool for Power Platform☆10Jul 21, 2025Updated 8 months ago
- Self-hosting binary instrumentation framework for security research☆12Apr 10, 2023Updated 2 years ago
- Currently proof-of-concept☆17Dec 17, 2021Updated 4 years ago
- Pickle decompiler plugin for Radare2☆18Aug 6, 2023Updated 2 years ago
- A dnSpy extension to hot-reload themes☆12Dec 27, 2020Updated 5 years ago
- ☆1,188Jan 27, 2025Updated last year
- JavaScript Obfuscation Tool☆18Oct 4, 2019Updated 6 years ago
- Optimizations for Pairing-Based Cryptography☆17Sep 10, 2021Updated 4 years ago
- Burp extension to decode NTLM SSP headers and extract domain/host information☆12Mar 25, 2021Updated 4 years ago
- JIT extensions for AsmResolver☆14May 19, 2019Updated 6 years ago
- Small tool to decode ASP.NET __VIEWSTATE variable when doing webpentests☆15Feb 27, 2021Updated 5 years ago
- Process Creation, Image Load and Thread Creation Notification☆13Sep 15, 2023Updated 2 years ago
- Conquer the deep ocean, host an .onion site fast!☆16Oct 12, 2022Updated 3 years ago
- HCTF 2017 线下赛平台☆14Dec 17, 2017Updated 8 years ago
- ☆12Jun 25, 2021Updated 4 years ago
- Simple website to automatically generate string encryption/decryption routines for C#☆10Feb 12, 2022Updated 4 years ago
- RISC-V Disassembler☆18Aug 25, 2020Updated 5 years ago
- ☆14Aug 31, 2021Updated 4 years ago
- runc容器逃逸漏洞预警☆15Feb 14, 2019Updated 7 years ago
- 飞龙易语言源码集☆15Oct 24, 2014Updated 11 years ago
- This is a demo of how to protect and hide processes by using various techniques on Windows platform☆10Nov 1, 2020Updated 5 years ago
- fastjson-1.2.58-rce with h2 database☆34Aug 5, 2019Updated 6 years ago
- Lattice reduction technique☆10Oct 14, 2014Updated 11 years ago
- Writeups for various CTFs☆17Nov 20, 2018Updated 7 years ago
- A C++14/17 header-only Windows memory editing library with a focus on type safety and modern C++ style.☆13Jun 3, 2019Updated 6 years ago
- Oh My Zsh Theme line.zsh-theme☆14Apr 7, 2020Updated 5 years ago
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Sep 8, 2021Updated 4 years ago
- Complete basic string decryptor to help new reversers. The code is commented☆12Jun 12, 2020Updated 5 years ago
- Network Security Config patcher for Android applications (APKs)☆13Sep 4, 2021Updated 4 years ago
- 南京邮电大学网络攻防新星赛0xGame2020开源题目☆14Sep 19, 2021Updated 4 years ago
- Grepify the GUI Regex Text Scanner for Code Reviewers☆23Apr 15, 2013Updated 12 years ago
- PoC for Scala and Groovy☆14Apr 4, 2016Updated 9 years ago