cs-ubbcluj-ro / FPLinks
Lecture and seminar examples for the Fundamentals of Programming (2025-2026) course.
☆24Updated 3 weeks ago
Alternatives and similar repositories for FP
Users that are interested in FP are comparing it to the libraries listed below
Sorting:
- Netcat for windows 32/64 bit☆771Updated last year
- Cosas copypaste☆14Updated 2 years ago
- Output the SSH private key to the correct Open SSH format for use☆10Updated last year
- ☆13Updated last year
- Extract NFS files from wireshark capture (pcap)☆26Updated last year
- HTB Certified Penetration Testing Specialist CPTS Study☆281Updated 2 years ago
- Detailed Instructions on the creation of custom/modified DMA (attack) Firmware based on pcileech-fpga☆983Updated last month
- WhiteWinterWolf's PHP web shell☆738Updated 8 years ago
- Proof of Concept for CVE-2025-24367☆28Updated 2 months ago
- CVE-2024-21413 PoC for THM Lab☆212Updated last year
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆627Updated 4 years ago
- Wordlists for creating statistically likely username lists for use in password attacks and security testing☆1,250Updated 3 years ago
- Username tools for penetration testing☆1,308Updated last year
- ☆46Updated this week
- Updated GNU Screen 4.5.0 Exploit: This repository hosts an enhanced exploit for GNU Screen 4.5.0, optimized for Kali Linux 2024. It inclu…☆17Updated last year
- Bienvenue sur le dépôt GitHub de Hacking-France, le site dédié à la communauté de hacking éthique francophone. Ce projet vise à rassemble…☆12Updated last week
- Penelope Shell Handler☆1,513Updated this week
- All cheetsheets with main information from HTB CBBH role path in one place.☆113Updated last year
- This command prepares your project directory for "Mynewproject" in the showcase directory and "mynewproject" in the boxes directory, incl…☆16Updated last year
- Generates millions of keyword-based password mutations in seconds.☆1,403Updated 8 months ago
- Reducing the prices of DMA Firmware☆630Updated 7 months ago
- Active Directory Enumeration and Exploitation☆12Updated last week
- ☆986Updated 3 years ago
- A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule☆589Updated last year
- Dominate Active Directory with PowerShell.☆1,158Updated 2 months ago
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,524Updated last month
- ☆26Updated last year
- Abusing impersonation privileges through the "Printer Bug"☆2,172Updated 5 years ago
- A simple tool for bypassing file upload restrictions.☆890Updated last year
- Compiled Binaries for Ghostpack☆1,591Updated last year