andraxsnakesecurity / CVE-PoC-in-GitHubView external linksLinks
All CVE - PoC in GitHub
☆13Mar 22, 2024Updated last year
Alternatives and similar repositories for CVE-PoC-in-GitHub
Users that are interested in CVE-PoC-in-GitHub are comparing it to the libraries listed below
Sorting:
- Frequently asked questions about augmentation, biohacking, grinding, implants, and related topics.☆10Nov 26, 2024Updated last year
- ☆10Oct 18, 2024Updated last year
- Bienvenue sur le dépôt GitHub de Hacking-France, le site dédié à la communauté de hacking éthique francophone. Ce projet vise à rassemble…☆12Updated this week
- ANSI C12.18(2006) stack implement by C.☆12Oct 27, 2016Updated 9 years ago
- 📧 Python script to forward emails using Gmail.☆10Apr 4, 2023Updated 2 years ago
- ☆14Nov 1, 2017Updated 8 years ago
- Instructions for hacking and cloning RFID cards☆18Nov 28, 2023Updated 2 years ago
- Node module for interacting with Navy Federal Credit Union's API☆13Jun 22, 2016Updated 9 years ago
- Python tool for detecting subdomain takeover vulnerabilities by resolving CNAME records and checking for known error messages. It support…☆15Feb 2, 2025Updated last year
- Automatically exported from code.google.com/p/protostar-solutions☆13Mar 26, 2015Updated 10 years ago
- image3 maker thing☆16Aug 25, 2013Updated 12 years ago
- Buspirate support in python3 for I2C scripting☆11May 23, 2015Updated 10 years ago
- FlipperZero Bad USB script for loadouts☆10Mar 25, 2024Updated last year
- 白名单机制的本地HTTPS反向代理,可对HTTPS请求的SNI进行修改或去除以突破互联网封锁☆18May 26, 2025Updated 8 months ago
- python script that report every player of the game exept your friend and you☆12Feb 12, 2023Updated 3 years ago
- AU335:计算机视觉 课程大作业。Back to the Non-deep-learning Era: 非深度学习的车牌检测与识别算法。基于特征提取、模板匹配等技术。☆13Nov 22, 2021Updated 4 years ago
- Easy to use, lightweight and unified library for performing common microcontroller tasks☆21Apr 5, 2012Updated 13 years ago
- DNS Dashboard for hunting and identifying beaconing☆16Jul 29, 2020Updated 5 years ago
- Python script that allow user to see the member of the team in champ select, and to send a message with the u.gg in the chat☆11Jan 26, 2023Updated 3 years ago
- Get 10k subdomains in securitytrails using cookie without apikey.☆36Oct 23, 2025Updated 3 months ago
- An Internet Chess Server supporting Chess variants (based on Lasker-2.2.3)☆12Oct 29, 2021Updated 4 years ago
- Navy Federal Python Module☆16May 22, 2023Updated 2 years ago
- Neuviks Terraform Red Team Workshop☆14Aug 10, 2025Updated 6 months ago
- An Unofficial, Fanmade Build Creator/Planner for Cyberpunk 2077☆12Mar 15, 2024Updated last year
- 修复停止维护的Vxhunter IDA插件项目在python3高些的版本下运行的若干问题☆14Aug 26, 2024Updated last year
- ☆14Jul 26, 2024Updated last year
- ☆16Nov 11, 2022Updated 3 years ago
- Unified Docker stack for Monero (P2Pool) + Tari merge mining with a custom web dashboard, routed over Tor.☆25Updated this week
- ☆15Mar 22, 2021Updated 4 years ago
- Google Phishing with ESP8266☆16Jul 28, 2024Updated last year
- A CLI tool that queries a Huawei LTE WiFi router (MiFi) to get statistics such as signal strength, battery status, remaining data balance…☆13May 9, 2021Updated 4 years ago
- WordPress XML-RPC & WP-Login Bruteforce + Auto Uploader Powerful asynchronous bruteforce tool for WordPress sites via wp-login.php and …☆20Apr 22, 2025Updated 9 months ago
- 🗄️💧 Find exposed and unsecured databases from a list of hosts. 🗄️💧☆15Jul 1, 2021Updated 4 years ago
- Load various payload (DLL from memory, Exe, etc...) in a way to evade static analysis of Antivirus. It can fetch data from various method…☆15Jun 18, 2025Updated 7 months ago
- Demo code to go along with Hackaday article on circular buffers☆15Jun 27, 2018Updated 7 years ago
- Watching LiveTV using an Android device with host USB port and a DVB-T tuner☆18Apr 21, 2012Updated 13 years ago
- Desktop application that estimates fuel consumption using a trained machine learning model.☆18Oct 23, 2022Updated 3 years ago
- Aircrack-ng Suite Scripts to Easily Demonstrate Wifi Attacks☆13May 23, 2021Updated 4 years ago
- Awesome-LLM4SVD from "A Systematic Literature Review on Detecting Software Vulnerabilities with Large Language Models"☆56Updated this week