☆17Jul 22, 2016Updated 9 years ago
Alternatives and similar repositories for General-Resources-Box
Users that are interested in General-Resources-Box are comparing it to the libraries listed below
Sorting:
- Text file containing NSFW words aggregated from various sources.☆10Aug 23, 2020Updated 5 years ago
- Pentest utils☆14Oct 8, 2016Updated 9 years ago
- syscall hijacking in 2019☆13Feb 25, 2019Updated 7 years ago
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆33Sep 15, 2025Updated 5 months ago
- Reverse-engineering, documenting and hacking a dog shock collar for use as a sex toy☆10Jun 13, 2021Updated 4 years ago
- buddycloud static site generation and gh_pages☆18Sep 8, 2016Updated 9 years ago
- A Productivity-Boosting Burp Suite extension written in Kotlin that enables persistent sticky session handling in web application testing…☆12Oct 8, 2025Updated 4 months ago
- The ronin-rb.dev website☆24Jan 12, 2026Updated last month
- Using OpenCV and MatLab for edge detection in the Lab colorspace☆12Feb 20, 2015Updated 11 years ago
- Ruby On Rails unrestricted render() exploit☆16Feb 9, 2018Updated 8 years ago
- Grepify the GUI Regex Text Scanner for Code Reviewers☆23Apr 15, 2013Updated 12 years ago
- Exemple d'extension Burp permettant d'utiliser les fichiers de configuration de proxy PAC☆11Feb 28, 2016Updated 10 years ago
- ☆10Sep 5, 2022Updated 3 years ago
- Binary, Analysis, and Disassembler Radare2 Plugins for Dan32 architechture binaries☆18Aug 21, 2017Updated 8 years ago
- A small and dirty Python 2 decompiler written in Python.☆13Dec 29, 2013Updated 12 years ago
- SecLists is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sens…☆11Jun 14, 2014Updated 11 years ago
- Convert gpsxml files to png files which can be opened in Qgis☆13Aug 16, 2016Updated 9 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- Vulnerability Management tool using the CVE-Search database☆10Apr 22, 2016Updated 9 years ago
- A very basic introduction to reverse engineering (in general and for Android) as well as some useful tools (apktool, dex2jar, jd-cmd) pac…☆12Jul 21, 2020Updated 5 years ago
- Cobalt Strike Aggressor Script Collection☆19Mar 30, 2018Updated 7 years ago
- ☆17Jun 15, 2016Updated 9 years ago
- WAF Testing Tool☆21May 16, 2014Updated 11 years ago
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- ☆12Aug 14, 2018Updated 7 years ago
- Resource mining and processing plugin for Kerbal Space Program.☆11Jul 6, 2022Updated 3 years ago
- A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.☆13Sep 23, 2017Updated 8 years ago
- Modding tools for the Shenmue HD release☆17Mar 11, 2019Updated 6 years ago
- ☆11May 19, 2017Updated 8 years ago
- An OSMF based playback technology for Video.JS☆24Oct 29, 2014Updated 11 years ago
- Go solutions for the cryptopals crypto challenges: http://cryptopals.com/☆12Feb 22, 2022Updated 4 years ago
- ☆33Jan 16, 2026Updated last month
- Windows Application Attack Surface Analyzer☆24Feb 22, 2024Updated 2 years ago
- Utilities for working with Kony mobile applications.☆19Jul 12, 2024Updated last year
- Burp plugin that clusters responses to show an overview of received responses☆15Jun 7, 2019Updated 6 years ago
- A library that makes developing Swing applications on Jython much less painful☆16Jan 23, 2018Updated 8 years ago
- Remote adb Executor Library☆15Apr 7, 2014Updated 11 years ago
- Fotolia API toolkits☆23Nov 30, 2016Updated 9 years ago
- An Xcode project for testing the recently found kernel panic on iOS devices☆16Feb 25, 2015Updated 11 years ago