☆12Jul 1, 2018Updated 7 years ago
Alternatives and similar repositories for DeserializationExercises
Users that are interested in DeserializationExercises are comparing it to the libraries listed below
Sorting:
- Serial Whitelist Application Trainer☆30Jul 7, 2019Updated 6 years ago
- A native and unofficial implementation of p0f3 in Python with extra analysis features: It's p0f3+!☆26Apr 7, 2022Updated 3 years ago
- ☆13Feb 28, 2017Updated 9 years ago
- Calibre plugin to synchronize books with Google Books☆12May 11, 2020Updated 5 years ago
- it's quite self explanatory: a crawler with sqlmap☆13Jul 13, 2017Updated 8 years ago
- Tools and resources to support Chaos Engineering☆11Sep 6, 2018Updated 7 years ago
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- Reads `env.yml` and makes a validated list of variables available as environment variables☆10Sep 19, 2018Updated 7 years ago
- JavaScript library for creating particles animation.☆10Mar 23, 2016Updated 9 years ago
- A simple threaded Python script that returns the authentication methods supported by each of a list of SSH servers..☆12Jul 29, 2015Updated 10 years ago
- References, tools and sample payloads☆11Sep 16, 2016Updated 9 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- Bit level timing calculator for CAN/CANFD☆12Mar 30, 2022Updated 3 years ago
- ☆16Jul 21, 2018Updated 7 years ago
- Browser Vulnerability Exploit DB(浏览器漏洞PoC数据库)☆10Feb 7, 2017Updated 9 years ago
- Top 10 million and top ~800 million passwords sorted from the newest breach compilation (leaked early 2019 and and a total of 3.2 Billio…☆12May 30, 2020Updated 5 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- ☆21Dec 4, 2014Updated 11 years ago
- Simple visualized cetz editor☆11Apr 22, 2025Updated 10 months ago
- ☆11Dec 26, 2023Updated 2 years ago
- ☆11May 3, 2023Updated 2 years ago
- A host monitoring proof of concept that uses python and ebpf to watch for bad behavior and optionally take action on it.☆12Jul 14, 2019Updated 6 years ago
- A JRuby implementation of the BurpExtender interface for PortSwigger Burp Suite. Not currently maintained -- see tduehr/buby☆28Apr 30, 2011Updated 14 years ago
- Maltego Local Transform to use Hybrid Analysis Public API - https://www.hybrid-analysis.com/apikeys/info☆12Sep 7, 2018Updated 7 years ago
- Using the shortest codes and simplest params to create wifi hotspot☆11Jan 18, 2021Updated 5 years ago
- ☆13May 30, 2024Updated last year
- ☆12Jun 7, 2018Updated 7 years ago
- Audit and test security vulnerabilities or simply wreak chaos upon your ROS system☆11Jul 12, 2018Updated 7 years ago
- DOOM Eternal patcher for modding purposes.☆12Apr 14, 2021Updated 4 years ago
- ☆46May 15, 2016Updated 9 years ago
- NixNoteにタブブラウザ機能と連想ノート機能を付けました。連想ノート機能はユーザの操作履歴に基づいて関連するノートを算出して提示します。☆14Jul 20, 2015Updated 10 years ago
- An evolving hacking framework written in python☆11Jan 11, 2015Updated 11 years ago
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 3 years ago
- A tool for analysing continuous glucose monitoring (CGM) data in epidemiology.☆13Feb 1, 2022Updated 4 years ago
- Get version headers from a list of websites☆12Oct 1, 2020Updated 5 years ago
- Creates dynamic Anki cards testing for grammar, at the moment Japanese only☆12Jul 6, 2017Updated 8 years ago
- ☆12May 28, 2023Updated 2 years ago
- Identify vulnerabilities in your API's using the OpenAPI Security Scanner☆12Dec 6, 2018Updated 7 years ago