RSArmageddon
☆28Feb 5, 2024Updated 2 years ago
Alternatives and similar repositories for RSArmageddon
Users that are interested in RSArmageddon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Personal pwning toolset developed/used by myself. Use at your own risk.☆18Sep 26, 2022Updated 3 years ago
- Java library for Elliptic Curve Cryptography☆13Aug 20, 2018Updated 7 years ago
- Kathara labs for Practical Network Defense course at Sapienza☆16Mar 4, 2026Updated 3 weeks ago
- Open Shop Scheduling Problem resolution via Ant Colony Optimization algorithm.☆14Mar 28, 2023Updated 2 years ago
- Departure Board at Home, to see when the SL buss, tunnelbanan, pendeltåg, och färjor will depart. A simple implementation with XIAO ESP32…☆12Jun 20, 2025Updated 9 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Python script to create a dataset with all the features available on Glassnode for the analysis of the Bitcoin cryptocurrency.☆12Mar 24, 2023Updated 3 years ago
- Go package for nmap network scanning tool☆18Jun 7, 2023Updated 2 years ago
- ☆24Sep 13, 2022Updated 3 years ago
- ☆21Aug 31, 2022Updated 3 years ago
- kotlin-notebook is a Jupyter Docker Stack image that's including the Kotlin kernel to Jupyter notebook.☆20Feb 24, 2026Updated last month
- Subtitle format implementation as components for desktop applications☆23Feb 25, 2021Updated 5 years ago
- Keycloak admin API allows low privilege users to use administrative functions☆28Oct 12, 2024Updated last year
- ☆18May 7, 2024Updated last year
- This is a simple boilerplate to help you start with pywebview and React.☆23Sep 1, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- small cute utils for kernel challenges☆40Apr 23, 2024Updated last year
- Mapping of OPENQASM programs to IBM QX satisfying the architectural constraints☆22Feb 17, 2021Updated 5 years ago
- Make a decent karaoke video from any song in about 10 minutes.☆36Dec 30, 2025Updated 2 months ago
- CVE-2021-1994、CVE-2021-2047、CVE-2021-2064、CVE-2021-2108、CVE-2021-2075、CVE-2019-17195、CVE-2020-14756、CVE-2021-2109☆12Sep 13, 2021Updated 4 years ago
- Implementation of https://eprint.iacr.org/2021/232☆92Mar 5, 2021Updated 5 years ago
- tools for shellcoding☆59Aug 12, 2023Updated 2 years ago
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆52Aug 5, 2022Updated 3 years ago
- Kernel Read Write Execute☆84Aug 30, 2024Updated last year
- 3G/4G/5G authentication test troubleshooting tool☆61May 11, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- [CVE-2020-6287] SAP NetWeaver AS JAVA (LM Configuration Wizard) Authentication Bypass (Create Simple & Administrator Java User)☆13Sep 18, 2020Updated 5 years ago
- This repository contains a proof-of-concept (PoC) exploit for CVE-2024-24919, a critical vulnerability discovered in Check Point SVN. The…☆16Jun 5, 2024Updated last year
- Map 2G/3G/4G and more cellular networks in real live with a simple smart phone, pretty much like osmocomBB monitoring feature.☆170Dec 16, 2025Updated 3 months ago
- Firewire recording device☆25Updated this week
- CVP "trick" for CTF challenges☆149Jun 19, 2023Updated 2 years ago
- CVE-2021-3378 | FortiLogger - Unauthenticated Arbitrary File Upload (Metasploit)☆22Feb 28, 2021Updated 5 years ago
- AES-GEM (AES Galois Extended Mode) implementation.☆13Feb 9, 2026Updated last month
- ☆12Feb 24, 2023Updated 3 years ago
- Derivate of the OpenPCR Project☆15Mar 16, 2017Updated 9 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆14Nov 1, 2024Updated last year
- Solver for the Electric Vehicle Routing Problem with Time Windows☆38Sep 16, 2018Updated 7 years ago
- This is a collection of known malware and threats found on various Linux/web servers. Also find known ways to detect☆12Aug 1, 2020Updated 5 years ago
- PoWx mission: Aiming at smaller energy per hash hardware.☆11Dec 18, 2021Updated 4 years ago
- map and spoof remoteid coordinates☆18Updated this week
- A quantum enhanced, totaly private encryption app that uses true random key generation from zero point energy.☆13Jul 2, 2025Updated 8 months ago
- Repository of now harmless TREZOR security exploits☆11Jun 14, 2015Updated 10 years ago