mufeedvh / l33tmarioView external linksLinks
Mario the game but you rescue the princess by hacking.
โ22Feb 12, 2022Updated 4 years ago
Alternatives and similar repositories for l33tmario
Users that are interested in l33tmario are comparing it to the libraries listed below
Sorting:
- dictionary-based hash cracker written in rust. ๐งโ14Aug 22, 2021Updated 4 years ago
- CVE-2020-25223โ11Sep 13, 2021Updated 4 years ago
- HTTP request smuggling toolsโ18Aug 17, 2020Updated 5 years ago
- โ49Dec 19, 2020Updated 5 years ago
- The Web Security Testing Guide is a comprehensive open source guide to testing the security of web applications and web services.โ31Oct 27, 2025Updated 3 months ago
- CVE-2019-8449 Exploit for Jira v2.1 - v8.3.4โ68Feb 3, 2020Updated 6 years ago
- darknet crawler to map linksโ10Apr 15, 2020Updated 5 years ago
- Techniques that i have used to evade anti-virus during pen tests.โ13May 29, 2018Updated 7 years ago
- A tool used to check if a CNAME resolves to the scope address. If the CNAME resolves to a non-scope address it might be worth checking ouโฆโ135Aug 14, 2023Updated 2 years ago
- A chrome extension for customizing highlight color.โ12Mar 13, 2022Updated 3 years ago
- Windows Classic style for GitHubโ11Jul 10, 2019Updated 6 years ago
- Binary exploitation exercises and scriptsโ12Mar 15, 2022Updated 3 years ago
- Metasploit Post-Exploitation Gather module for Exchange Serverโ25Mar 26, 2021Updated 4 years ago
- Example of building a Windows Server 2016 AMI for EC2 using Packerโ12Sep 6, 2018Updated 7 years ago
- Python utility to export a user's starred repositories list into a CSV fileโ17May 3, 2018Updated 7 years ago
- This YouTube Ad Blocker extension is available for both Chrome and Firefox browsers. It is designed to block ads on YouTube videos and ofโฆโ11Aug 6, 2023Updated 2 years ago
- Metasploit Red Team Competition Modulesโ13Apr 10, 2011Updated 14 years ago
- virustotal API-based project for checking the list of hashes against virustotal.com databaseโ11Feb 26, 2018Updated 7 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)โ13Jun 6, 2023Updated 2 years ago
- โ14Nov 16, 2024Updated last year
- Sample of a Malicious baseband signed by Appleโ10May 12, 2022Updated 3 years ago
- โ20Feb 22, 2021Updated 4 years ago
- Aruba Instant (IAP) - Remote Code Execution Exploitโ10Jul 30, 2021Updated 4 years ago
- RATs library 2003 to presentโ16Oct 14, 2023Updated 2 years ago
- Simple project to test Elasticsearch with Django, build on docker.โ10Aug 16, 2020Updated 5 years ago
- Simple Golang JWT Bruteforcer 2โ10May 25, 2021Updated 4 years ago
- Windows Antivirus Evasion and Memory Injectionโ12Feb 19, 2022Updated 3 years ago
- XOrCryptEx lightweight C Utility/Algorithmโ11Mar 3, 2022Updated 3 years ago
- Tartocitron is a repo to have fun with malwares and the Rust language. This repo provides working examples of dropper written in Rust.โ11May 31, 2022Updated 3 years ago
- WordPress Backup Guard Authenticated Remote Code Execution Exploitโ10Jul 30, 2021Updated 4 years ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19โ15Jul 23, 2020Updated 5 years ago
- Angecryption PoCโ12Mar 27, 2014Updated 11 years ago
- tl;tr; jhaddix bhmv5โ10Jul 2, 2020Updated 5 years ago
- ๐ My Bug Bounty Writeupsโ10Nov 16, 2025Updated 2 months ago
- Visualizing Path Finding using A* algorithmโ14Nov 7, 2022Updated 3 years ago
- Web Crawler for Identifying Entry Pointsโ11Mar 26, 2024Updated last year
- Collection of mods for Total War: Warhammer IIIโ13Aug 25, 2022Updated 3 years ago
- iOS forensics utilityโ12May 8, 2018Updated 7 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can lโฆโ17May 7, 2021Updated 4 years ago