Monopoly Deal game
☆16Jan 11, 2018Updated 8 years ago
Alternatives and similar repositories for 3ree-monopoly-deal
Users that are interested in 3ree-monopoly-deal are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A C++ library and tools providing easy access to the retdec.com decompilation service through their REST API.☆11Jun 17, 2018Updated 7 years ago
- Implementation of several grid routers in Rust☆13Feb 28, 2026Updated last month
- Malware Analysis and Storage System - Server repository☆12Jul 15, 2022Updated 3 years ago
- API to use Cymru services☆27Dec 6, 2013Updated 12 years ago
- CaPI: Compiler-assisted Performance Instrumentation☆18Mar 23, 2026Updated last week
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Our Game for the Global Game Jam 2012☆21Jan 20, 2014Updated 12 years ago
- Implementation of hMETIS☆12Aug 2, 2022Updated 3 years ago
- C code metamorphic obfuscator☆13Feb 20, 2015Updated 11 years ago
- ClamWin ClamAV Unofficial win32 port (OLD REPO DO NOT USE)☆18Nov 2, 2017Updated 8 years ago
- A repository for development of the TAXII Specifications. For official releases, please see http://taxiiproject.github.io/releases/☆41Nov 29, 2015Updated 10 years ago
- ClashOfClans☆17Feb 1, 2013Updated 13 years ago
- Parses IE's Automatic Crash Recovery Files☆16Feb 3, 2017Updated 9 years ago
- I'll post some malware analysis from time to time.☆24Apr 3, 2021Updated 4 years ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Jun 24, 2014Updated 11 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Advanced Malware Analysis [video], published by Packt☆22Jan 24, 2023Updated 3 years ago
- KPMG Cyber Security Challenge 2017 questions repository and writeups☆19Apr 15, 2019Updated 6 years ago
- Royal Road RTF Weaponizer object decoder☆24Sep 26, 2024Updated last year
- Denial of Service PoC for CVE-2020-1350 (SIGRed)☆18Jul 16, 2020Updated 5 years ago
- VPS infrastructure found in HT dumps☆26Jul 10, 2015Updated 10 years ago
- Proof of Concept of exploit against Spectre Variant 2 Vulnerability☆22May 23, 2020Updated 5 years ago
- Vaccine for STOP/DJVU ransomware, prevents encryption☆25Oct 30, 2025Updated 5 months ago
- Multi-way hypergraph partitioning algorithms: FMS (Fiduccia-Mattheyses-Sanchis), PLM (Partitioning by Locked Moves), PFM (Partitioning by…☆20Dec 27, 2025Updated 3 months ago
- ☆23Jan 2, 2023Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A detours library for API hooking in C#☆33Jun 20, 2012Updated 13 years ago
- An open source deobfuscator for 'Obfuscar'☆29May 10, 2016Updated 9 years ago
- ☆43Jul 2, 2018Updated 7 years ago
- Repository for the OWASP/WASC Distributed Web Honeypots Project -☆35Apr 16, 2015Updated 10 years ago
- A Maltego transform for VirusTotal Submitter Information☆36May 15, 2019Updated 6 years ago
- ☆39Mar 31, 2021Updated 4 years ago
- MALM: Malware Monitor☆49Jun 14, 2013Updated 12 years ago
- Linux malware analysis based on Cuckoo Sandbox.☆41Apr 19, 2023Updated 2 years ago
- Simple DNS honeypot script☆51Jan 23, 2026Updated 2 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Helper script for working with format string bugs☆57May 2, 2020Updated 5 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Feb 8, 2019Updated 7 years ago
- A Network Inspection Tool☆82Oct 13, 2017Updated 8 years ago
- Artifact of "Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor" [USENIX Security 2024]☆60Aug 9, 2024Updated last year
- A search tool for IDA☆70Nov 26, 2016Updated 9 years ago
- Application for cracking Red Petya key based on genetic algorithms.☆56Apr 14, 2022Updated 3 years ago
- [ARCHIVED] native library to manage quadkey in a fast way☆61Jan 5, 2026Updated 2 months ago