Proof of Work generator
☆12Jun 26, 2019Updated 6 years ago
Alternatives and similar repositories for pow
Users that are interested in pow are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ruby - pwn tools☆11Nov 7, 2015Updated 10 years ago
- checksec tool for win10☆25Aug 21, 2017Updated 8 years ago
- My CTF writeup☆26Mar 20, 2017Updated 9 years ago
- Exploit for Adobe Coldfusion BlazeDS Java Object Deserialization RCE☆11Feb 7, 2018Updated 8 years ago
- A backdoor embedded with Twitter Player Card☆12May 1, 2017Updated 9 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆18Aug 14, 2019Updated 6 years ago
- NVIDIA SocketCAN drivers for Bosch Time Triggered M_CAN and Tegra Hypervisor sec CAN☆12Dec 26, 2021Updated 4 years ago
- specific fuzzers based on AFL and fuzzing results☆42Oct 22, 2016Updated 9 years ago
- Cross debugger suite☆20Jul 9, 2021Updated 4 years ago
- Use Dispatch to add AFL-compatible instrumentation to your binaries☆12Dec 30, 2016Updated 9 years ago
- A site to easily decode the content of Rails sessions stored in cookies.☆16Jan 26, 2014Updated 12 years ago
- Simple hash-mining c library and its python binding.☆64Jun 28, 2019Updated 6 years ago
- Code samples used for the blog post☆24Jan 24, 2017Updated 9 years ago
- An IDA_Wrapper for linux, shipped with an Function Identifier. It works well with Driller on static linked binaries.☆14Sep 12, 2019Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Experimental Java agent to stomp on things.☆15Feb 10, 2019Updated 7 years ago
- Exploiting Python PIL Module Command Execution Vulnerability☆56Nov 29, 2021Updated 4 years ago
- Watching the Flag☆15Dec 16, 2015Updated 10 years ago
- cve-2014-0130 rails directory traversal vuln☆18May 15, 2017Updated 9 years ago
- LD_PRELOAD hook to trace malloc and free☆45Dec 31, 2017Updated 8 years ago
- Two-factor authentication in the command line utilizing macOS keychain.☆26May 14, 2019Updated 7 years ago
- Client for the Webkit Remote Debugging server☆18Dec 28, 2018Updated 7 years ago
- Fuzzing compression libraries☆20Jan 10, 2016Updated 10 years ago
- CVE-2017-13089☆56Nov 15, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Yet another IDA Pro real time syncing plugin☆16Mar 27, 2018Updated 8 years ago
- A custom web vulnerability scanner☆27Nov 17, 2018Updated 7 years ago
- ☆16Aug 10, 2018Updated 7 years ago
- ☆68Apr 27, 2020Updated 6 years ago
- ☆27Mar 6, 2021Updated 5 years ago
- Solutions for my 34C3CTF challenges☆21Jul 9, 2018Updated 7 years ago
- CVE-2019-6467 (BIND nxdomain-redirect)☆26Apr 25, 2019Updated 7 years ago
- A small utility to grep for pointers & binary data in memory dumps / live process memory☆24Jul 16, 2018Updated 7 years ago
- Although the Mersenne Twister PRNG is by design not cryptographically secure many applications tend to use it for cryptographic operation…☆28Oct 23, 2015Updated 10 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- VTable dumper for IDA 7.7+☆19Jun 19, 2025Updated 11 months ago
- Simulate afl-fuzz☆16Aug 1, 2019Updated 6 years ago
- Binary rewriting approach with fork server support to fuzz Java applications with afl-fuzz.☆91May 3, 2018Updated 8 years ago
- ☆27Apr 6, 2018Updated 8 years ago
- Another plugin for CRLF vulnerability detection☆25Jan 25, 2017Updated 9 years ago
- A simple run-only applescript disassembler☆143Dec 17, 2025Updated 5 months ago
- Reverse whois query tool☆11Jul 28, 2016Updated 9 years ago