☆19Sep 1, 2018Updated 7 years ago
Alternatives and similar repositories for static-html-docker-server
Users that are interested in static-html-docker-server are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- If it looks, tastes, and smells like Legacy Console Edition, it probably is Console EXPERIENCE!☆10Mar 28, 2023Updated 2 years ago
- hacking tools awesome lists☆16Jul 26, 2017Updated 8 years ago
- A easy to use lock screen app☆13Jun 14, 2023Updated 2 years ago
- Use Frida DBI to instrument binary and perform basic-block code coverage that is fed back to AFL.☆12Nov 23, 2019Updated 6 years ago
- A curated list of cryptography papers, articles, tutorials and howtos.☆10Feb 19, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- insta-onion: Create a Tor Onion service in 20 seconds☆14Apr 12, 2020Updated 5 years ago
- A vi-like text editor for terminal☆19Jan 8, 2022Updated 4 years ago
- Exploiting Jackson deserialization vulnerability with 3 gadgets☆10May 3, 2021Updated 4 years ago
- 🐥 Gallery Viewer for Anime Girls Holding Programming Books☆12Mar 4, 2026Updated 3 weeks ago
- Organise and access data collected during internal network pentests☆10Jun 4, 2020Updated 5 years ago
- ☆11Jan 14, 2026Updated 2 months ago
- Simple keystrokes on-screen display☆20Nov 3, 2022Updated 3 years ago
- JWT key confusion attack, i.e. re-sigining RS256 to HS256☆13May 4, 2022Updated 3 years ago
- Spring Boot Web with Hessian☆11Jul 2, 2014Updated 11 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆15Jun 18, 2015Updated 10 years ago
- jackson-databind-exploit☆13Mar 22, 2019Updated 7 years ago
- Automated haproxy for Docker containers using docker-gen☆15Mar 26, 2018Updated 7 years ago
- Misskey Meilisearch Data Migration Tool☆14Apr 2, 2024Updated last year
- Example AIDL service and client☆11Nov 30, 2021Updated 4 years ago
- ☆16Sep 23, 2021Updated 4 years ago
- tiktok tools | scrapping | automation☆31Nov 10, 2025Updated 4 months ago
- Sudo 1.6.x <= 1.6.9p21 and 1.7.x <= 1.7.2p4 Local Privilege Escalation and vulnerable container☆10Dec 16, 2017Updated 8 years ago
- Unpacker for donut shellcode☆21Jun 20, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Aptos Keyless ZK circuit implementation in circom, together with a Rust-based ZK proving service☆21Mar 14, 2026Updated last week
- A set of scripts to facilitate HTTP interception on mobile apps☆20Mar 11, 2026Updated 2 weeks ago
- A basic Calculator with five functions for addition, subtraction, division, multiplication and modulo operation☆11Dec 8, 2022Updated 3 years ago
- This repo stores something about reverse engineering technique fundemental☆16Jan 16, 2023Updated 3 years ago
- pasted intent store client☆11Jul 2, 2021Updated 4 years ago
- licensed under itself☆12Apr 1, 2016Updated 9 years ago
- Client Framework for Minecraft☆11May 1, 2022Updated 3 years ago
- ☆13Dec 27, 2025Updated 2 months ago
- An example binary protocol application for learning CANAPE☆23Dec 14, 2014Updated 11 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Setup of NGINX, and turning it into a Reverse Proxy with hardened rules/settings.☆11Apr 22, 2020Updated 5 years ago
- Send packets to a RADIUS server and show reply☆18Mar 21, 2015Updated 11 years ago
- Dissecting and Defeating Ransomware's Evasion Tactics Defcon 32☆17Aug 9, 2024Updated last year
- Electron symbol server☆24Nov 23, 2025Updated 4 months ago
- (HotMobile'24) Salted Inference: Enhancing Privacy while Maintaining Efficiency of Split Inference in Mobile Computing☆17Jan 22, 2024Updated 2 years ago
- A guide to Uncommon Hacks, written especially for first-time hackers☆12Mar 3, 2023Updated 3 years ago
- An authorized remote user with access or knowledge of the standard encryption key can gain access and decrypt the FortiOS backup files an…☆25Dec 19, 2023Updated 2 years ago