GDBP-PEDA Cheat Sheet
☆16Feb 14, 2017Updated 9 years ago
Alternatives and similar repositories for gdb-peda-cheatsheet
Users that are interested in gdb-peda-cheatsheet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 5 years ago
- A simple and classic Sudoku Game build in Android Studio with Kotlin for Android Users.☆17Feb 16, 2023Updated 3 years ago
- digital signature with SHA256withRSA in Java☆10Jul 15, 2017Updated 8 years ago
- An implementation of faster-rcnn for people detection in python☆10Apr 30, 2019Updated 6 years ago
- Challenges for INShAck☆20Apr 10, 2017Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Python tool to parse and decrypt files quarantined by windows defender☆13Feb 25, 2023Updated 3 years ago
- A tool to reset SSH keys on Linux EC2 instances and enable Guest access without a password on Windows instances☆11Dec 8, 2015Updated 10 years ago
- CVE-2025-6218 is a directory traversal vulnerability in WinRAR that allows an attacker to place files outside the intended extraction dir…☆16Jul 10, 2025Updated 8 months ago
- Web App for Online Games Selling Site using Java with JSP & Servlets. Also used HTML5, CSS3, Bootstrap and MySQL.☆13Oct 11, 2018Updated 7 years ago
- A Ghidra script to aid reverse engineering of Android native (.so) libraries, by identifying dynamically registered functions within the …☆16Feb 27, 2024Updated 2 years ago
- SEETF 2023 Public Challenge Files, Sources, and Solutions☆18Jun 18, 2023Updated 2 years ago
- QExplore is a dynamic automatic exploration tool for dynamic web applications. It reverse engineers a state-flow model that can be used t…☆13Mar 6, 2025Updated last year
- ☆57Sep 2, 2018Updated 7 years ago
- Python script for querying the apple servers for the location of wifi access points☆14May 31, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Challenges, flags, solvers and writeups for the Securinets INSAT Friendly CTF edition 2024.☆24Oct 16, 2024Updated last year
- Learn x64 assembly by making games!☆19Jun 15, 2025Updated 9 months ago
- LDAP library for auditing MS AD☆13Nov 28, 2023Updated 2 years ago
- Upload of all challenges from idekCTF 2022☆25Jan 20, 2023Updated 3 years ago
- ☆34Jun 11, 2024Updated last year
- ☆23Jul 27, 2018Updated 7 years ago
- Interpretable LambdaMART☆11Apr 24, 2025Updated 11 months ago
- Backdoor for Windows systems (client and server) writen in C (client) and ASM (server) using reverse connection☆19Jul 6, 2014Updated 11 years ago
- An experimental server for the CSCG game "Maze"☆26Dec 30, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- customize your Termux terminal like a pro☆26Aug 25, 2024Updated last year
- Public repository of the QuickJS Javascript Engine. Pull requests are not accepted. Use the mailing list to submit patches.☆28Jul 15, 2025Updated 8 months ago
- DRAFT : Dataset Reconstruction Attack From Trained ensembles. Source code associated with the paper "Trained Random Forests Completely Re…☆19Aug 25, 2025Updated 7 months ago
- ☆11Dec 22, 2025Updated 3 months ago
- Burp Suite extension that extends Burp to support storing and reusing variables in requests☆27Feb 10, 2026Updated last month
- A C/C++/python implementation of Deformable Part Based Model☆23Apr 25, 2013Updated 12 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow with Stack Cookie Bypass Exploit☆20Jan 9, 2017Updated 9 years ago
- Colored pencil or highlighter to use in Neovim☆10Feb 8, 2025Updated last year
- This is a curated list of mobile based CTFs, write-ups and vulnerable apps. Most of them are android based due to the popularity of the p…☆33Nov 21, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Wifi/Ethernet network session hijacker based on Scapy☆21Mar 14, 2013Updated 13 years ago
- ☆25Mar 24, 2023Updated 3 years ago
- Adversarial Ranking Attack and Defense, ECCV, 2020.☆24Sep 16, 2021Updated 4 years ago
- code we used in Decision Boundary Analysis of Adversarial Examples https://openreview.net/forum?id=BkpiPMbA-☆29Oct 17, 2018Updated 7 years ago
- ☆23Jul 28, 2023Updated 2 years ago
- Simple C library for parsing and writing CSV files.☆11May 22, 2013Updated 12 years ago
- Python Game Cheat Framework☆19Sep 12, 2022Updated 3 years ago