https://exploit-exercises.com/fusion/
☆20Dec 29, 2015Updated 10 years ago
Alternatives and similar repositories for fusion
Users that are interested in fusion are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CTF write-ups / solution scripts☆23Nov 4, 2018Updated 7 years ago
- Go language Single Sign On (SSO) with Google☆10Apr 2, 2017Updated 9 years ago
- memcached protocol for server implementation☆15Jan 4, 2022Updated 4 years ago
- a modular malware framework written in golang☆11May 6, 2019Updated 6 years ago
- Clipsal C-Bus Wiser plugin for home bridge☆11Apr 11, 2023Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Dumping ground for whatever IDA Pro scripts I write☆16Oct 9, 2016Updated 9 years ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- ☆10Aug 8, 2015Updated 10 years ago
- ☆13Dec 22, 2017Updated 8 years ago
- A simple tool for parsing elf binaries☆10Aug 18, 2019Updated 6 years ago
- Discover potential timestamps within the Windows Registry☆19Apr 22, 2014Updated 11 years ago
- littleoldearthquake☆12Jul 15, 2014Updated 11 years ago
- Bypass Antivm and Cuckoo Sandbox Techniques☆12Oct 12, 2016Updated 9 years ago
- Simple RAT (only on own network) made in C++☆19Mar 11, 2013Updated 13 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆17Dec 2, 2025Updated 4 months ago
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Feb 20, 2016Updated 10 years ago
- Plugins for Scylla☆20Sep 14, 2011Updated 14 years ago
- Exploitation challenges for CTF☆64Feb 13, 2018Updated 8 years ago
- ☆26May 7, 2018Updated 7 years ago
- ☆18Feb 4, 2016Updated 10 years ago
- A gamification solution for ESG stock portfolio ratings. 🌲🏙☆19May 25, 2022Updated 3 years ago
- ☆15Mar 2, 2014Updated 12 years ago
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Jan 5, 2015Updated 11 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Tools to work with vulnerability standards.☆19Mar 19, 2014Updated 12 years ago
- Heap exploitation technique bypassing heap ASLR☆49Sep 2, 2019Updated 6 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- ☆44Dec 23, 2014Updated 11 years ago
- ☆21Apr 2, 2024Updated 2 years ago
- Automatically exported from code.google.com/p/narly☆24Jul 11, 2021Updated 4 years ago
- This is the repository for the youtube screencast☆10Sep 14, 2020Updated 5 years ago
- Exploit Reliability Testing System☆35Apr 24, 2015Updated 10 years ago
- ASLR bypass in Chrome version 77☆24Oct 28, 2019Updated 6 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆15Mar 24, 2016Updated 10 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆26Jan 15, 2017Updated 9 years ago
- Collection of solutions to common concurrent problems☆11Oct 26, 2017Updated 8 years ago
- How to write basic memory corruption exploits on Windows☆28Sep 14, 2016Updated 9 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow with Stack Cookie Bypass Exploit☆20Jan 9, 2017Updated 9 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- BeEF Remote Control Metasploit Plugin - see README.beef☆13May 11, 2018Updated 7 years ago