blog
☆14Jan 1, 2020Updated 6 years ago
Alternatives and similar repositories for Blog
Users that are interested in Blog are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Windows 8.1 + IE 11 Exploit☆18Jul 26, 2016Updated 9 years ago
- HitCon 2015 spartan 0day & exploit☆27Sep 1, 2015Updated 10 years ago
- Browser Fuzzing Framework ,浏览器Fuzzing 框架..☆31Jun 17, 2016Updated 9 years ago
- gnu gcov like tool☆12Jun 18, 2015Updated 10 years ago
- Simple commit search utility for Chromium Google Source.☆29Dec 8, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Windows Kernel Dump Analyzer☆15May 9, 2015Updated 10 years ago
- my public code☆166Jan 11, 2017Updated 9 years ago
- A Modern Approach☆10Sep 5, 2015Updated 10 years ago
- fuzz☆125Jul 18, 2015Updated 10 years ago
- Redmine plugin for email encryption with the OpenPGP standard☆19Jan 29, 2016Updated 10 years ago
- Borrowed Instructions Synthetic Computation☆70Feb 20, 2015Updated 11 years ago
- A ptrace based sandbox. (PoC)☆14Jun 3, 2018Updated 7 years ago
- Download all of Microsoft's security updates and symbols☆41Mar 31, 2016Updated 10 years ago
- random python stuff☆26Jan 7, 2016Updated 10 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- An automated way to send phishing emails from Google/G-suite.☆18Nov 30, 2018Updated 7 years ago
- ☆17Sep 3, 2018Updated 7 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Jun 9, 2018Updated 7 years ago
- Slides from presentations done by ESET researchers☆20Dec 18, 2015Updated 10 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Mar 14, 2014Updated 12 years ago
- ☆11Dec 10, 2017Updated 8 years ago
- Python wrapper for the Windows CDB Debugger☆20Feb 9, 2022Updated 4 years ago
- an RCE (remote command execution) approach of CVE-2018-7750☆21Nov 6, 2018Updated 7 years ago
- Python to analyse bitcoin blockchain, chainstate, blockindex, mempool etc☆11Jun 18, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- EwoMail是基于Linux的企业邮箱服务器,集成了众多优秀稳定的组件,是一个快速部署、简单高效、多语言、安全稳定的邮件解决方案☆13Nov 25, 2022Updated 3 years ago
- DbgFlashVul☆12Sep 8, 2015Updated 10 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- 实验室工作实录,一个二导☆33Dec 18, 2022Updated 3 years ago
- Security by EOS LIVE team.☆15Dec 24, 2018Updated 7 years ago
- ☆23Jul 24, 2013Updated 12 years ago
- Analysis tools and exploit sample scripts for Adobe Reader 10/11 and Acrobat Reader DC☆79May 28, 2016Updated 9 years ago
- YApi REC 远程代码执行漏洞利用工具☆13Aug 28, 2021Updated 4 years ago
- ☆16Apr 24, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A smart file fuzzer.☆26Aug 19, 2016Updated 9 years ago
- A proof-of-concept DLL that prints out the password a user enters into Veracrypt while decrypting a volume.☆15Oct 26, 2018Updated 7 years ago
- ☆12May 6, 2020Updated 5 years ago
- ☆15Feb 13, 2018Updated 8 years ago
- Tools for instrumenting Windows Defender's mpengine.dll☆37Nov 1, 2018Updated 7 years ago
- Trigger and exploit code for CVE-2014-4113☆42Feb 14, 2016Updated 10 years ago
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Jan 10, 2020Updated 6 years ago