A brute-forcing delta robot
☆28Sep 17, 2014Updated 11 years ago
Alternatives and similar repositories for R2B2
Users that are interested in R2B2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Damn Vulnerable Node Application☆20Dec 22, 2015Updated 10 years ago
- Web page preview and analysis tool☆12Jan 11, 2023Updated 3 years ago
- Tool for viewing Android package details, including permissions, services, activities, and more.☆22Nov 30, 2012Updated 13 years ago
- USB HID for Penetration Testing☆13Apr 6, 2016Updated 10 years ago
- ☆40Feb 23, 2016Updated 10 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year
- Cheat-Sheet with events too look out for when analysing malicious Office documents☆19Oct 21, 2017Updated 8 years ago
- Automated F5 Big IP Remote Code Execution (CVE-2020-5902) Scanner Written In Python 3☆12Dec 17, 2021Updated 4 years ago
- RSYaba Modular Brute Force Attacker☆19Jun 2, 2014Updated 11 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15May 29, 2015Updated 10 years ago
- rebirth IOS11 - 11.3.1 jailbreak security research utility☆26Feb 2, 2026Updated 3 months ago
- Malicious use of macho, such as dump-runtime-macho, function-hook.☆15Mar 20, 2017Updated 9 years ago
- build system to cross-compile cydia packages for cydia.radare.org☆10Aug 23, 2019Updated 6 years ago
- Collection of Vulnerable Websites containing File Upload Vulnerability for practicing skill☆13Jun 6, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- I hate this iPad 2☆10Oct 13, 2013Updated 12 years ago
- A security write-up about the Paypal API & data leakage☆25May 27, 2016Updated 9 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated 2 years ago
- ☆11Jun 5, 2017Updated 8 years ago
- REST/JSON interface to Burp Suite☆33Oct 12, 2020Updated 5 years ago
- NAT Pinning test suite tool for penetration testers.☆31Feb 17, 2014Updated 12 years ago
- CTF Writeups☆16Jul 18, 2017Updated 8 years ago
- [DEPRECATED] Locally-installed tools required by the DexPatcher Gradle v1 plugins☆13Mar 21, 2019Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Deliberately vulnerable web application☆22Jun 18, 2017Updated 8 years ago
- dispatcher like gcd for c++☆10Dec 30, 2015Updated 10 years ago
- Lab Website For Practicing Different Types of SQL Injection Vulnerabilities☆21Oct 27, 2023Updated 2 years ago
- A test framework for testing SSL/TLS client certificate validation.☆94Sep 14, 2021Updated 4 years ago
- ☆17Jan 12, 2018Updated 8 years ago
- ☆17Jul 23, 2014Updated 11 years ago
- A remake of iRecovery based off the syringe library.☆28Apr 11, 2011Updated 15 years ago
- TWRP device tree for Galaxy S7 (Qualcomm)☆11Sep 9, 2016Updated 9 years ago
- ☆35Aug 29, 2012Updated 13 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Vulnerable Grails application☆43Jun 12, 2015Updated 10 years ago
- This device silently hunts its prey, swooping in to gather RFID cards.☆33Apr 20, 2022Updated 4 years ago
- A tool that uses your iPhone or iPod Touch's AES engine to calculate keys/ivs for IPSW files.☆24Feb 21, 2014Updated 12 years ago
- ☆14Jun 14, 2016Updated 9 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 9 years ago
- Collection of information security policies.☆29Apr 20, 2017Updated 9 years ago
- Staging area for my OpenWrt patches☆13Dec 13, 2015Updated 10 years ago