☆30Nov 27, 2023Updated 2 years ago
Alternatives and similar repositories for recent-files-exclusions
Users that are interested in recent-files-exclusions are comparing it to the libraries listed below
Sorting:
- Minecraft plugin for Bukkit API compatible servers. Vanilla selector parsing for non-vanilla commands.☆11Jun 30, 2024Updated last year
- Various shellcodes☆12Sep 1, 2020Updated 5 years ago
- Companion Worm research☆16Nov 8, 2021Updated 4 years ago
- MineCraft服务器CDKey插件☆11Aug 2, 2022Updated 3 years ago
- A Spigot plugin to add configurable messages!☆15Aug 17, 2024Updated last year
- Demos presented on Hackerfest 2015☆14Nov 9, 2015Updated 10 years ago
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.☆17Dec 12, 2023Updated 2 years ago
- As I work thought the book "Practical Binary Analysis" by Dennis Andriesse, https://practicalbinaryanalysis.com/ I try to make editions f…☆11Sep 28, 2021Updated 4 years ago
- adobe reader sandbox utility☆11Aug 7, 2020Updated 5 years ago
- WinAppDbg helper script to catch API calls☆12Mar 26, 2013Updated 12 years ago
- A fuzz demo for windows driver based on IoControlCode☆12May 25, 2018Updated 7 years ago
- Threat Hijacking Simple Implementation☆19Feb 24, 2025Updated last year
- A tool evaluates security configurations of a given PE based on SDL without source code☆15Jul 6, 2014Updated 11 years ago
- 借助腾讯云·云函数实现的 ACME Let’s Encrypt SSL 证书自动更新☆21May 15, 2022Updated 3 years ago
- Some drivers I've written while solving exercises from Practical Reverse Engineering☆15Jan 9, 2022Updated 4 years ago
- A log4shell detector using ProGuardCORE☆10Aug 5, 2022Updated 3 years ago
- A curated list of browser fuzzing researches, papers, tools, ...☆14Jan 30, 2023Updated 3 years ago
- Forked from Akayan. Windows Kernel Exploitation. Static & dynamic analysis, exploits & vuln reasearch. Mitigations bypass's, genric bug-c…☆16Oct 29, 2024Updated last year
- Android 各版本新特性及避坑指南☆14Jan 17, 2023Updated 3 years ago
- A small utility to run raw code chunks in the executable memory area.☆15Feb 6, 2015Updated 11 years ago
- A controlled environment for demonstrating and understanding buffer overflow vulnerabilities in web applications. This project is designe…☆25Jan 27, 2025Updated last year
- Hands-on experiments to demonstrate the exploitability of insecure TLS configurations in Android apps☆15Jan 18, 2022Updated 4 years ago
- Python script for dumping firmware from read-back protected nRF51 chips☆14Jan 17, 2018Updated 8 years ago
- API tool for hashes.com escrow☆12Dec 13, 2025Updated 3 months ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- Config for the self-hosted infrastructure and services used by my open source projects☆23Feb 13, 2026Updated last month
- A cross platform framework to recover driver's communication interface.☆11Mar 26, 2021Updated 4 years ago
- A simple class in C++ to load and read/write process memory, it comes with an example of how to decrypt the once popular demoscene e-zine…☆17Feb 5, 2015Updated 11 years ago
- ☆14Jul 20, 2020Updated 5 years ago
- ☆12Aug 31, 2022Updated 3 years ago
- ☆16Dec 20, 2021Updated 4 years ago
- Slides, codes, and materials related to my courses☆16Dec 19, 2025Updated 3 months ago
- prebuild angr wheels for Windows on x86_64☆15Jul 21, 2018Updated 7 years ago
- Linux Malware creator to attack Windows System via Reverse Shell with FindWindow Process Code Injection☆19Mar 18, 2023Updated 3 years ago
- A server-side implementation of the AppleSkin mod for Paper/Spigot servers☆27Sep 14, 2022Updated 3 years ago
- Tool to extract metamask vault hash☆12Nov 3, 2024Updated last year
- ☆11Mar 5, 2020Updated 6 years ago
- stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆12Jun 7, 2021Updated 4 years ago
- CVE-2014-0816☆25Oct 5, 2016Updated 9 years ago