DIY Skill
☆28Jun 30, 2023Updated 2 years ago
Alternatives and similar repositories for open-sourcerer
Users that are interested in open-sourcerer are comparing it to the libraries listed below
Sorting:
- DEFCON-RUSSIA WEB☆13Mar 30, 2021Updated 4 years ago
- ☆10Dec 2, 2016Updated 9 years ago
- ☆11Sep 1, 2022Updated 3 years ago
- CTF writeups☆16Nov 25, 2025Updated 3 months ago
- Node kickass.to json API wrapper☆21Jul 26, 2016Updated 9 years ago
- Manage NFS4 mounts☆18Oct 31, 2025Updated 4 months ago
- Shell scripts for receiving NOAA weather satellites via Raspberry Pi.☆19Dec 18, 2016Updated 9 years ago
- Operator for the mutating admission webhook for ClusterResourceOverride☆18Mar 13, 2026Updated last week
- A step-by -step guide on securing a Linux server, for beginners☆14Oct 1, 2018Updated 7 years ago
- Run your Binary Ninja Python console in a separate Terminal window.☆18Nov 1, 2018Updated 7 years ago
- AI Substitutor is an extension for Burp Suite that uses AI functionality to substitute values of HTTP request parameters and headers.☆27Apr 30, 2025Updated 10 months ago
- Micro Club is celebrating Hacktoberfest for the third year, join us in the open source community!☆14Jan 30, 2024Updated 2 years ago
- 快速搭建各种漏洞环境(Various vulnerability environment) https://hub.docker.com/r/medicean/vulapps/☆19Sep 9, 2017Updated 8 years ago
- Useful collection of scapy-scripts and more☆32Jun 23, 2024Updated last year
- Self-signed UEFI- and GRUB-based secure boot system for Ubuntu.☆23Feb 3, 2020Updated 6 years ago
- This Repository contains the stable beta preview of the next major secureCodeBox (SCB) release v2.0.0.☆23Oct 14, 2020Updated 5 years ago
- Grafana Labs bug bounty☆30Oct 1, 2024Updated last year
- BRICS+ CTF 2024 Quals☆22Oct 6, 2024Updated last year
- Challenges and solutions for Maple CTF 2022.☆28Sep 15, 2022Updated 3 years ago
- ☆15Mar 26, 2021Updated 4 years ago
- CTF writeups for the CTFs and Vulnerable Boxes I play with sometimes☆11Apr 20, 2017Updated 8 years ago
- Extendable Cyber Range Framework that easily deploys scenarios that aim to improve the knowledge of the cyber defense workforce. It uses …☆40Apr 5, 2024Updated last year
- A search index specialised for LaTeX equations. Developed for latexsearch.com.☆17Jul 15, 2011Updated 14 years ago
- Plugin for IDA Pro to convert assembler to LLVM IR☆20Nov 15, 2016Updated 9 years ago
- CLI based tool for global dns [propagation] check☆27Apr 22, 2017Updated 8 years ago
- Generate a reverse shell macro for Word documents.☆39May 28, 2022Updated 3 years ago
- experimental ui (underconstruction)☆16May 2, 2025Updated 10 months ago
- [ARCHIVED] The code repository for the DCPU-16 Toolchain.☆97Dec 13, 2017Updated 8 years ago
- Python wrapper for http://nacl.cace-project.eu/☆30Nov 8, 2021Updated 4 years ago
- C4T BuT S4D Attack-Defence CTF☆13Feb 6, 2022Updated 4 years ago
- ☆44Jul 23, 2021Updated 4 years ago
- Loopback web application for administration of Datawake networks☆10May 2, 2017Updated 8 years ago
- Code and templates required to build the DARPA open catalog.☆18Mar 23, 2016Updated 9 years ago
- Detect some forms of linux kernel tampering☆12Jun 12, 2015Updated 10 years ago
- A vulnerability within Microsoft Office's wwlib allows attackers to achieve remote code execution with the privileges of the victim that …☆59Oct 17, 2025Updated 5 months ago
- An exploit farm for attack/defense CTFs.☆28Feb 14, 2026Updated last month
- book website☆73Feb 7, 2022Updated 4 years ago
- OSINT tool for discovering confidential data leaked on Github.☆51Sep 16, 2023Updated 2 years ago
- A minimal UDP/IP stack in FORTH☆15Jun 25, 2018Updated 7 years ago