Intel(R) Software Guard Extensions Protected Code Loader for Linux* OS
☆27Aug 4, 2022Updated 3 years ago
Alternatives and similar repositories for linux-sgx-pcl
Users that are interested in linux-sgx-pcl are comparing it to the libraries listed below
Sorting:
- crash poc & Leak info PoC☆18Mar 19, 2018Updated 7 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- ☆18May 8, 2015Updated 10 years ago
- A proof of concept for Joomla's CVE-2015-8562 vulnerability (Object Injection RCE)☆10May 3, 2024Updated last year
- Starterkit for building apps with form.io and vue☆13Jan 21, 2026Updated last month
- ☆10Mar 29, 2018Updated 7 years ago
- MS17-010☆12Oct 25, 2017Updated 8 years ago
- Not Actively Maintained - Example of Scala persistence with Squeryl☆12Sep 6, 2022Updated 3 years ago
- build system to cross-compile cydia packages for cydia.radare.org☆10Aug 23, 2019Updated 6 years ago
- Script to export the definition for an Amazon Lex bot using the Amazon Lex Model Building Service API.☆13Jul 24, 2017Updated 8 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- Running TaintDroid from the command line and analyze output☆17Mar 28, 2012Updated 13 years ago
- A dialog à la Material Design☆19May 20, 2015Updated 10 years ago
- The Form.io main front-end application.☆13May 11, 2023Updated 2 years ago
- bmod parses binaries for modification/patching and disassembles machine code sections.☆12Apr 19, 2018Updated 7 years ago
- Popping boxes with Nmap☆18Apr 16, 2012Updated 13 years ago
- A CAPTCHA recognition demo in tensorflow.☆11Jun 13, 2017Updated 8 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆18Jan 29, 2018Updated 8 years ago
- Sample code for JVM Concurrency series Part 3☆11Jun 26, 2014Updated 11 years ago
- Spock Workshop starter code☆13Oct 17, 2019Updated 6 years ago
- ☆12Oct 12, 2013Updated 12 years ago
- A sample Java web app that implements the client credential auth flow to call Microsoft Graph.☆10Dec 3, 2022Updated 3 years ago
- Discrete signal processing tool for side chanel data leakage attacks and analysis. Air-gapped keylogger PoC.☆11Oct 31, 2023Updated 2 years ago
- Configure an LDAPS Endpoint for Simple AD☆14Aug 29, 2017Updated 8 years ago
- vncsnapshot☆14Mar 23, 2012Updated 13 years ago
- Normalizer for honeypot data.☆11Dec 6, 2023Updated 2 years ago
- Apache Sling Scripting HTL Engine☆14Sep 5, 2025Updated 5 months ago
- ☆12Jun 13, 2016Updated 9 years ago
- Music Routes data: What musicians played on which tracks?☆15Updated this week
- Formerly jsr222.java.net☆10Sep 13, 2018Updated 7 years ago
- Firmware for BridgeIC functionality for 1S servers for Yosemite Platform☆12Jun 10, 2019Updated 6 years ago
- Preliminary and non-final documentation for JTA Specification (JSR 907)☆11Mar 27, 2018Updated 7 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- ☆11Oct 22, 2018Updated 7 years ago
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- WikiLeaks Cablegate Reference Network Visualization : cables.csv to graph to svg/html5☆29Apr 20, 2014Updated 11 years ago
- The repository of Icecite, a research paper management system.☆15Mar 29, 2018Updated 7 years ago