Advisories and Proofs of Concept by BlackArrow
☆19Dec 17, 2024Updated last year
Alternatives and similar repositories for advisories
Users that are interested in advisories are comparing it to the libraries listed below
Sorting:
- ☆23Aug 1, 2020Updated 5 years ago
- Learn the basics of cryptography throughout history.☆21Jan 30, 2021Updated 5 years ago
- A More Comfortable (remote) SHell with full pty support and both reverse / bindport connection mode.☆30May 12, 2013Updated 12 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆34Dec 19, 2021Updated 4 years ago
- Windows x64 Process Scanner to detect application compatability shims☆37Oct 17, 2018Updated 7 years ago
- Synaptics Audio Driver LPE☆38Apr 15, 2019Updated 6 years ago
- Automate Recon process using Shell Scripting☆11Nov 26, 2021Updated 4 years ago
- Portfolio website.☆10Nov 29, 2023Updated 2 years ago
- A toy project for extracting the amounts from a paper receipt☆13Apr 29, 2013Updated 12 years ago
- 个人,独立,中文,跨平台的3D渲染引擎☆11May 16, 2025Updated 9 months ago
- Documentation sources for syslog-ng Open Source Edition (https://github.com/syslog-ng/syslog-ng)☆10May 6, 2024Updated last year
- Several script and images used with the juice jacking kiosks☆12Jul 21, 2013Updated 12 years ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆13Oct 31, 2021Updated 4 years ago
- ☆14Updated this week
- LFI/RFI Payload Tests Project☆36Oct 21, 2019Updated 6 years ago
- This is a proof of concept exploit which bypasses root detection in Samsung's Knox Messenger. This has been reported to Knox Messenger te…☆15Jan 30, 2020Updated 6 years ago
- A repository to mass generate deepfake video based on DeepFaceLab repository.☆10Aug 10, 2023Updated 2 years ago
- ☆10May 28, 2020Updated 5 years ago
- Small snippets of code we often find useful☆11Nov 9, 2019Updated 6 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- CTF tasks created☆11Jan 12, 2023Updated 3 years ago
- Our work on Reinforcement learning that we share with the rest of the world☆13Jan 7, 2019Updated 7 years ago
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Jan 10, 2020Updated 6 years ago
- ☆13Jul 14, 2020Updated 5 years ago
- Apply different deep learning models to limit order book.☆11Mar 6, 2018Updated 8 years ago
- Try to detect HTTP desync attack (https://portswigger.net/blog/http-desync-attacks-request-smuggling-reborn)☆11Sep 20, 2019Updated 6 years ago
- Apify integration for Zapier☆15Updated this week
- Mirror of the OpenDaylight usc gerrit project☆12Sep 21, 2020Updated 5 years ago
- Step by step instructions on how to use the Jenkins Kubernetes plugin for different use cases.☆11Aug 9, 2019Updated 6 years ago
- Convert GnuPG private keys to Tor hidden service keys (and vice versa)☆12Jun 11, 2015Updated 10 years ago
- Mirror of https://gerrit.wikimedia.org/g/mediawiki/extensions/CheckUser/☆18Updated this week
- Turn your Raspberry Pi Pico into a hacking device☆13Mar 7, 2024Updated 2 years ago
- Simple smtp server in go☆11Jul 17, 2017Updated 8 years ago
- AliGuard PHP WAF☆12Feb 16, 2024Updated 2 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- Just an example of a well-known technique to detect memory tampering via Windows Working Sets.☆18Jan 15, 2022Updated 4 years ago
- ☆20Feb 22, 2021Updated 5 years ago
- Simulate System76 EC with area8051 emulator☆12Mar 2, 2024Updated 2 years ago
- nxdomain subdomain enumeration☆10Jul 17, 2022Updated 3 years ago