lancelot1 / ane-admobView external linksLinks
Admob Native Extension for Adobe Air(admob ane),open source complete include as3,java,and oc, extensive api,not need buy or Alchemy trojan code any more
☆14Mar 18, 2016Updated 9 years ago
Alternatives and similar repositories for ane-admob
Users that are interested in ane-admob are comparing it to the libraries listed below
Sorting:
- Guides for locking down a computer☆12Mar 4, 2023Updated 2 years ago
- A CTF VM that fights back☆19Apr 4, 2012Updated 13 years ago
- A simple XSS challenge example using Zombie.js☆10Apr 8, 2015Updated 10 years ago
- Capture-The-Flag(CTF) toolkit☆11Jan 8, 2015Updated 11 years ago
- For BurpSuite Plugins☆10Jun 25, 2015Updated 10 years ago
- ☆10Feb 18, 2016Updated 9 years ago
- Wireshark regression tests☆11Jan 21, 2021Updated 5 years ago
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Jan 5, 2015Updated 11 years ago
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- A CTF game for recovering a DSA private key.☆10Apr 21, 2020Updated 5 years ago
- Simple web app for displaying cowrie data in your browser☆12Jun 2, 2016Updated 9 years ago
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- Website for draco, the OverTheWire warzone☆12Sep 7, 2015Updated 10 years ago
- ☆17Oct 5, 2014Updated 11 years ago
- An hour(ish) long guide to using the unix command line, geared towards novice programmers!☆12Jun 15, 2015Updated 10 years ago
- Tool for automation of GUI-based testing.☆16Jan 7, 2015Updated 11 years ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- Virtual host brute forcer☆22Jan 10, 2014Updated 12 years ago
- Cross-site request forgery Learning Platform☆21Sep 13, 2014Updated 11 years ago
- This is a working copy of the OWASP Project Handbook and is the draft where changes are made before publishing a final version on the OWA…☆18Feb 22, 2017Updated 8 years ago
- For when Plan A fails☆13Jan 24, 2012Updated 14 years ago
- Pwnage☆17Jul 1, 2025Updated 7 months ago
- Home made trojan (c/c++)☆12Apr 14, 2023Updated 2 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30May 6, 2016Updated 9 years ago
- A Python script for indexing (putting) FireEye alert data into Elasticsearch...and notifying you too.☆16Dec 11, 2018Updated 7 years ago
- #HackingTogether☆14Jan 23, 2017Updated 9 years ago
- Scripts for communication with Bunitu Trojan C&Cs☆19Oct 29, 2015Updated 10 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- Phishing Toolkit☆19Feb 20, 2018Updated 7 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- AV Evasion, a Red Team Tool - Fiber, APC, PNG and UUID☆21Sep 7, 2021Updated 4 years ago
- List accounts with Service Principal Names (SPN) not linked to active dns records in an Active Directory Domain.☆38Dec 5, 2025Updated 2 months ago
- Shell script to create an onion-router for your Raspberry Pi from a stock Moebius image☆28Jul 10, 2014Updated 11 years ago
- A simple linux rootkit project for COMP9447: Security Workshop☆20Jun 24, 2013Updated 12 years ago
- CVE-2016-5195 exploit written in Crystal☆13Oct 25, 2016Updated 9 years ago
- Tools for encrypting and decrypting things using Cisco's type 7 encryption.☆15Jan 11, 2013Updated 13 years ago
- Simple .NET loader for loading and executing Powershell payloads☆17Nov 5, 2021Updated 4 years ago
- A bot that tweets every time there's a new executive order published.☆15Feb 14, 2017Updated 9 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆21Aug 11, 2016Updated 9 years ago