☆26Mar 26, 2018Updated 7 years ago
Alternatives and similar repositories for Security_Exploit
Users that are interested in Security_Exploit are comparing it to the libraries listed below
Sorting:
- Emulation of UNIX V6 on PDP-11 with teletype☆29Oct 4, 2023Updated 2 years ago
- Wordpress Vulnerability - XSS ( Cross-Site Scripting )☆17Sep 5, 2022Updated 3 years ago
- The long shadow to emerge as other Git repositories☆18Feb 25, 2026Updated 3 weeks ago
- a shell written in C☆13Mar 15, 2021Updated 5 years ago
- Vulnerable ASP based Web Application☆18Jan 25, 2019Updated 7 years ago
- Tutorial of Face Detection using OpenVino python☆11Nov 23, 2020Updated 5 years ago
- CTF platform we wrote and used for justCTF 2019☆12Jun 25, 2022Updated 3 years ago
- Bypass Constrained Language Mode in PowerShell☆29May 21, 2019Updated 6 years ago
- Make you iPhone accessible for AI agents.☆29Sep 6, 2025Updated 6 months ago
- Buffer Overflows☆28Jan 30, 2021Updated 5 years ago
- Writeup for the challenges in H@cktivityCon CTF 2020☆17Aug 6, 2020Updated 5 years ago
- A collection of hacks and one-off scripts☆18Jun 4, 2021Updated 4 years ago
- 关于蜜罐的一些微小的统计工作☆30Aug 26, 2020Updated 5 years ago
- CVE-2022-32119 - Arox-Unrestricted-File-Upload☆17Dec 20, 2023Updated 2 years ago
- Projects from Sophomore to Senior year at AU | Resume: http://resume.github.io/?nairuzabulhul☆30Oct 29, 2017Updated 8 years ago
- Collection of CTF Writeups☆12Dec 8, 2022Updated 3 years ago
- small, fast memset based on microsoft's design☆13Apr 5, 2022Updated 3 years ago
- Efficient Violence Detection Using 3D Convolutional Neural Networks☆15Jan 6, 2021Updated 5 years ago
- Microvm is a virtual machine and compiler. This project is inspired by a work by Aleksei Udalov: https://github.com/aleksei-udalov/vm.git☆10May 16, 2021Updated 4 years ago
- Embed and obfuscate data in Portable Network Graphics☆14Feb 8, 2026Updated last month
- 四川大学教务系统chrome插件☆11Sep 19, 2019Updated 6 years ago
- Command Line Implementation for Node Cron Under 20 Lines.☆10Jul 16, 2021Updated 4 years ago
- Command line Teensy Loader☆11Sep 21, 2015Updated 10 years ago
- Wordpress Two-factor Authentication Brute-forcer☆19Oct 22, 2019Updated 6 years ago
- Docker files for Miasm☆17Apr 27, 2018Updated 7 years ago
- ☆16Sep 6, 2017Updated 8 years ago
- Restaurant Point of Sale and Inventory System☆11Jun 8, 2016Updated 9 years ago
- React UI☆11Jan 4, 2023Updated 3 years ago
- Prototype for an in memory fuzzer☆13Aug 1, 2017Updated 8 years ago
- ☆11Jul 15, 2024Updated last year
- Vulnerable Task Manager☆22Jan 14, 2025Updated last year
- ☆12Oct 14, 2020Updated 5 years ago
- Sample of a Malicious baseband signed by Apple☆10May 12, 2022Updated 3 years ago
- Zeromutarts Capture the Flag 2013 challenge writeups☆22Dec 9, 2013Updated 12 years ago
- ☆18Jun 28, 2020Updated 5 years ago
- POC of CVE-2021-2394☆21Aug 2, 2021Updated 4 years ago
- Awesome list for baseband modem resources.☆13Jun 20, 2018Updated 7 years ago
- ESP8266 ROM Bootloader utility☆11Oct 18, 2017Updated 8 years ago
- ZigBee hacking tools and scripts☆14Mar 25, 2018Updated 7 years ago