Proof of Work generator
☆12Jun 26, 2019Updated 6 years ago
Alternatives and similar repositories for pow
Users that are interested in pow are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ruby - pwn tools☆11Nov 7, 2015Updated 10 years ago
- checksec tool for win10☆25Aug 21, 2017Updated 8 years ago
- My CTF writeup☆26Mar 20, 2017Updated 9 years ago
- A backdoor embedded with Twitter Player Card☆12May 1, 2017Updated 8 years ago
- ☆18Aug 14, 2019Updated 6 years ago
- NVIDIA SocketCAN drivers for Bosch Time Triggered M_CAN and Tegra Hypervisor sec CAN☆12Dec 26, 2021Updated 4 years ago
- specific fuzzers based on AFL and fuzzing results☆41Oct 22, 2016Updated 9 years ago
- Cross debugger suite☆20Jul 9, 2021Updated 4 years ago
- Use Dispatch to add AFL-compatible instrumentation to your binaries☆12Dec 30, 2016Updated 9 years ago
- A site to easily decode the content of Rails sessions stored in cookies.☆16Jan 26, 2014Updated 12 years ago
- Simple hash-mining c library and its python binding.☆64Jun 28, 2019Updated 6 years ago
- Code samples used for the blog post☆24Jan 24, 2017Updated 9 years ago
- An IDA_Wrapper for linux, shipped with an Function Identifier. It works well with Driller on static linked binaries.☆14Sep 12, 2019Updated 6 years ago
- Experimental Java agent to stomp on things.☆15Feb 10, 2019Updated 7 years ago
- Exploiting Python PIL Module Command Execution Vulnerability☆56Nov 29, 2021Updated 4 years ago
- Watching the Flag☆15Dec 16, 2015Updated 10 years ago
- cve-2014-0130 rails directory traversal vuln☆19May 15, 2017Updated 8 years ago
- LD_PRELOAD hook to trace malloc and free☆45Dec 31, 2017Updated 8 years ago
- Two-factor authentication in the command line utilizing macOS keychain.☆26May 14, 2019Updated 6 years ago
- Client for the Webkit Remote Debugging server☆17Dec 28, 2018Updated 7 years ago
- Yet another IDA Pro real time syncing plugin☆16Mar 27, 2018Updated 7 years ago
- ☆16Aug 10, 2018Updated 7 years ago
- ☆68Apr 27, 2020Updated 5 years ago
- ☆27Mar 6, 2021Updated 5 years ago
- Solutions for my 34C3CTF challenges☆21Jul 9, 2018Updated 7 years ago
- CVE-2019-6467 (BIND nxdomain-redirect)☆26Apr 25, 2019Updated 6 years ago
- Although the Mersenne Twister PRNG is by design not cryptographically secure many applications tend to use it for cryptographic operation…☆28Oct 23, 2015Updated 10 years ago
- VTable dumper for IDA 7.7+☆19Jun 19, 2025Updated 9 months ago
- Simulate afl-fuzz☆16Aug 1, 2019Updated 6 years ago
- Binary rewriting approach with fork server support to fuzz Java applications with afl-fuzz.☆91May 3, 2018Updated 7 years ago
- ☆27Apr 6, 2018Updated 7 years ago
- Another plugin for CRLF vulnerability detection☆25Jan 25, 2017Updated 9 years ago
- Reverse whois query tool☆11Jul 28, 2016Updated 9 years ago
- ☆82Apr 20, 2021Updated 4 years ago
- Indonesia Presidential Election tally form (form C1) reader using deep learning (CNN) and computer vision☆11May 5, 2019Updated 6 years ago
- glibc getcwd() local privilege escalation compiled binaries☆32Feb 9, 2018Updated 8 years ago
- An API for consuming all the memory of Java apps using deserialization☆28Jan 10, 2016Updated 10 years ago
- Faster version of `symchk /om` for generating PDB manifests of offline machines☆19Apr 18, 2021Updated 4 years ago
- HITCON Badge Related Files.☆58Jul 24, 2018Updated 7 years ago