☆12Jul 1, 2018Updated 7 years ago
Alternatives and similar repositories for DeserializationExercises
Users that are interested in DeserializationExercises are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Serial Whitelist Application Trainer☆31Jul 7, 2019Updated 6 years ago
- Browser Vulnerability Exploit DB(浏览器漏洞PoC数据库)☆10Feb 7, 2017Updated 9 years ago
- JPEG2000 codec for RDP☆29Jan 28, 2026Updated last month
- ☆12Jun 7, 2018Updated 7 years ago
- SecLists is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sens…☆11Jun 14, 2014Updated 11 years ago
- ☆10Jan 26, 2016Updated 10 years ago
- Fork of jpeg2k code from https://code.google.com/p/jj2000/.☆19Feb 21, 2024Updated 2 years ago
- Purely-functional library for the discriminating cryptographer.☆10Dec 12, 2017Updated 8 years ago
- This is Chrome extension for detecting CSRF vulnerabilities.☆10Jun 23, 2017Updated 8 years ago
- A JRuby implementation of the BurpExtender interface for PortSwigger Burp Suite. Not currently maintained -- see tduehr/buby☆28Apr 30, 2011Updated 14 years ago
- Minimal pom.xml for JavaEE Projects☆34Oct 21, 2024Updated last year
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- A Capistrano (v3) task for automated Ubuntu server configuration (Installing Nginx, Postgre, Redis, RVM and many others)☆26Aug 24, 2016Updated 9 years ago
- A native and unofficial implementation of p0f3 in Python with extra analysis features: It's p0f3+!☆26Apr 7, 2022Updated 3 years ago
- Maltego Local Transform to use Hybrid Analysis Public API - https://www.hybrid-analysis.com/apikeys/info☆12Sep 7, 2018Updated 7 years ago
- ☆13Feb 28, 2017Updated 9 years ago
- Tools and resources to support Chaos Engineering☆11Sep 6, 2018Updated 7 years ago
- ☆14Jun 17, 2016Updated 9 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- CobaltStrike Aggressor Script to utilise FuzzySec's Windows Notification Framework Research to Spawn a Shell under Explorer.exe☆16Jul 6, 2019Updated 6 years ago
- Multithreaded HTTP scanner☆46Jun 3, 2020Updated 5 years ago
- Reactive Romeo and Juliet☆15Jul 16, 2015Updated 10 years ago
- A Java ImageIO plugin for the JBIG2 bi-level image format☆33May 24, 2022Updated 3 years ago
- ResiProxy is a ToxiProxy k8s companion☆15Dec 19, 2018Updated 7 years ago
- Audit and test security vulnerabilities or simply wreak chaos upon your ROS system☆11Jul 12, 2018Updated 7 years ago
- Reads `env.yml` and makes a validated list of variables available as environment variables☆10Sep 19, 2018Updated 7 years ago
- Liima - (AMW) Automated Middleware allows you to manage the configurations of your Java EE applications on an unlimited number of differe…☆26Updated this week
- OpenAM Policy Agent for Node.js / Express☆13Mar 2, 2026Updated 3 weeks ago
- ☆14Jul 25, 2023Updated 2 years ago
- DOOM Eternal patcher for modding purposes.☆12Apr 14, 2021Updated 4 years ago
- Just a simple SMTP server, implementation of @corpix smtpd library☆15May 8, 2020Updated 5 years ago
- ☆46May 15, 2016Updated 9 years ago
- JavaScript library for creating particles animation.☆10Mar 23, 2016Updated 10 years ago
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- A taster of TTWE☆18Sep 1, 2014Updated 11 years ago
- References, tools and sample payloads☆11Sep 16, 2016Updated 9 years ago
- Small tips and tricks for developers☆15Dec 28, 2015Updated 10 years ago
- Simple, configurable, vm-local chaotic operation orchestrator for measuring the resiliency of cloud services by inducing controlled chaos…☆11Jun 30, 2022Updated 3 years ago
- Data visualisation library, written in Rust☆29Sep 5, 2020Updated 5 years ago