mybrainishuge / recursion-promptsView external linksLinks
Repository of prompts to be solved using recursion
☆42Aug 28, 2018Updated 7 years ago
Alternatives and similar repositories for recursion-prompts
Users that are interested in recursion-prompts are comparing it to the libraries listed below
Sorting:
- Are WiFi Passwords we use these day's actually safe?☆10Mar 7, 2017Updated 8 years ago
- ☆13Mar 28, 2024Updated last year
- Short Python script for parsing Defender VDM signature files.☆10Sep 22, 2024Updated last year
- 📱 RUNIC tamper detection demo - designed to serve as a parallel for understanding more complex tamper detection and integrity systems su…☆15Apr 13, 2024Updated last year
- Python Library for ConfigExtractor☆14Feb 4, 2026Updated last week
- Python client library for the ClamAV antivirus.☆12May 15, 2025Updated 8 months ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- Detecting fake news articles by analyzing patterns in writing.☆10Mar 30, 2020Updated 5 years ago
- Software Modules and Examples for the PiFex☆14Aug 23, 2025Updated 5 months ago
- Are you able to use open source intelligence to solve this challenge?☆11Apr 14, 2019Updated 6 years ago
- ☆16Aug 25, 2025Updated 5 months ago
- PinterCoding University. Author : Gun Gun Febrianza☆11Jun 27, 2020Updated 5 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆25Jun 11, 2025Updated 8 months ago
- A python tool to generate an Excel file linking the list of cracked accounts and their LDAP attributes.☆12Jan 31, 2025Updated last year
- Ghidra script which fully parses COFF files☆12Oct 18, 2024Updated last year
- An another JWT cracker but really fast!☆11Jan 26, 2023Updated 3 years ago
- Security audit tool for Django sites☆14Jun 9, 2025Updated 8 months ago
- Open source code for use with Hunchly.☆10May 28, 2018Updated 7 years ago
- 🕵️ An android library to detect ADB debug☆17Jun 29, 2022Updated 3 years ago
- x64 Windows package of the shellcode2exe tool☆14Nov 23, 2020Updated 5 years ago
- Admin for☆16Jun 3, 2018Updated 7 years ago
- A Magisk module which adds custom certificate authorities from a pre-defined path on the Android file system to the system trust store.☆13Nov 12, 2024Updated last year
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated 10 months ago
- Spot all domain controllers in a Microsoft Active Directory environment. Find computer name, FQDN, and IP address(es) of all DCs.☆19Jun 23, 2024Updated last year
- A service container for interacting with SRA's VECTR☆16Apr 9, 2025Updated 10 months ago
- alternative to procdump☆11May 26, 2021Updated 4 years ago
- Malware analysis and Reverse Engineering Workshops from Invoke RE☆15Jun 30, 2024Updated last year
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 3 years ago
- This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offer…☆20May 22, 2025Updated 8 months ago
- Collection of Security Related Examples for Learning Purposes☆13Jan 29, 2016Updated 10 years ago
- ☆13Jan 3, 2016Updated 10 years ago
- DursVuln - Nmap Scripting Engine (NSE)☆21Jul 16, 2025Updated 6 months ago
- A macOS GUI for ipatool☆37Nov 12, 2025Updated 3 months ago
- single-threaded event driven sleep obfuscation poc for linux☆37Jun 14, 2025Updated 8 months ago
- ☆18Jun 25, 2024Updated last year
- Vulnerabilities advisories and PoC☆18Nov 21, 2025Updated 2 months ago
- .NET Project for performing Authenticated Remote Execution☆12Nov 22, 2023Updated 2 years ago
- Trivadis LAB Environment☆13Oct 29, 2021Updated 4 years ago
- GUI Application for Twitter Scraping and Sentiment Analysis.☆13Jun 11, 2018Updated 7 years ago