The Paper Artifact Availability
☆20Aug 26, 2022Updated 3 years ago
Alternatives and similar repositories for artifacts
Users that are interested in artifacts are comparing it to the libraries listed below
Sorting:
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Nov 25, 2019Updated 6 years ago
- My progress through Google's 2020 CTF as a part of the CyberJanitorialSecurityServices team!☆21Sep 4, 2020Updated 5 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆18Feb 17, 2015Updated 11 years ago
- https://deviceconnect.readthedocs.io/☆28Dec 11, 2024Updated last year
- Add my own POC to test Visual Studio trick to run code when building☆22Jul 18, 2017Updated 8 years ago
- Autonomous AI C2☆33Jul 23, 2024Updated last year
- Ardumoto Motor Driver Shield for Arduino, created by and available from SparkFun Electronics☆10Aug 13, 2019Updated 6 years ago
- ssh user enumeration☆12Mar 21, 2023Updated 2 years ago
- Tracks the ISS and when it is near your area it will send a tweet!☆12Feb 25, 2021Updated 5 years ago
- Automated management of ad campaigns in Google Display&Video 360.☆14Feb 9, 2026Updated 3 weeks ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- a hackbot proof-of-concept☆41Feb 24, 2024Updated 2 years ago
- Python script to parse Keytab files for macOS or *nix (typically /etc/krb5.keytab)☆41Jun 19, 2019Updated 6 years ago
- ☆38Nov 29, 2022Updated 3 years ago
- Performant physics-focussed quantum circuit library built in Rust☆16Sep 4, 2025Updated 6 months ago
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- MAGENTO implementation - CARD Processing @mobilPay☆11May 15, 2025Updated 9 months ago
- The HTML/JS/CSS for the Build Instructions for the Peachy Printer☆10Sep 11, 2014Updated 11 years ago
- A Python3-compatible fork of the Cryptanalib module from FeatherDuster.☆11Nov 27, 2025Updated 3 months ago
- This AppEngine sample application is designed to process your Waze CCP JSON Feed into; BigQuery GIS tables for analysis, Google Cloud Sto…☆11Dec 12, 2023Updated 2 years ago
- ☆10May 12, 2022Updated 3 years ago
- A repo of fake committed secrets to test tools that find committed secrets ([dont submit for BB :-) ]☆10Mar 22, 2018Updated 7 years ago
- Parses Facebook chat messages into Python objects to enable convenient analysis.☆11Jan 3, 2018Updated 8 years ago
- A secrets manager in times of crypto coins.☆11Dec 22, 2025Updated 2 months ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- Chrome extension to draw vector icons in chrome source code repository.☆10Aug 10, 2020Updated 5 years ago
- ☆11Jan 27, 2022Updated 4 years ago
- Files compiled from the Logica breach investigation materials☆45Aug 14, 2018Updated 7 years ago
- Kubernetes Unhinged Shell 😎☆46Oct 8, 2022Updated 3 years ago
- Script to crawl crbugs (Chromium Issues).☆10Jul 15, 2021Updated 4 years ago
- Creating a NIDS based on a Deep Neural Network (CNN)☆11Dec 31, 2018Updated 7 years ago
- ☆10May 6, 2021Updated 4 years ago
- ☆10Feb 10, 2025Updated last year
- ☆13Mar 31, 2019Updated 6 years ago
- Plugin for Magento versions: >2.0.6, 2.1, 2.2☆17Mar 19, 2021Updated 4 years ago
- The ultimate tool to crafting your ARM shell code☆10Aug 7, 2015Updated 10 years ago
- This is an example of a project with continuous fuzzing integration☆11Jul 26, 2020Updated 5 years ago
- A TC39 proposal for Maps and Sets with cache replacement policies like LRU and LFU.☆16Aug 20, 2022Updated 3 years ago
- 🛝 Transforms any RCE into a functional dumb shell. Designed for constrained environments (e.g., firewalls) where traditional reverse she…☆14Feb 18, 2026Updated 2 weeks ago