Repository of prompts to be solved using recursion
☆41Aug 28, 2018Updated 7 years ago
Alternatives and similar repositories for recursion-prompts
Users that are interested in recursion-prompts are comparing it to the libraries listed below
Sorting:
- ☆13Mar 28, 2024Updated last year
- Install AAB is a script that helps with installing an AAB file into a connected Android device☆13Feb 7, 2024Updated 2 years ago
- Are WiFi Passwords we use these day's actually safe?☆10Mar 7, 2017Updated 9 years ago
- Python client library for the ClamAV antivirus.☆12May 15, 2025Updated 9 months ago
- ☆16Aug 25, 2025Updated 6 months ago
- Software Modules and Examples for the PiFex☆14Aug 23, 2025Updated 6 months ago
- Resolve Skype accounts by phone number with API interface☆13Jul 16, 2023Updated 2 years ago
- Are you able to use open source intelligence to solve this challenge?☆11Apr 14, 2019Updated 6 years ago
- PinterCoding University. Author : Gun Gun Febrianza☆11Jun 27, 2020Updated 5 years ago
- Detecting fake news articles by analyzing patterns in writing.☆10Mar 30, 2020Updated 5 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆25Jun 11, 2025Updated 8 months ago
- A rust crate for parsing, writing and manipulating Android smali files.☆17Jan 14, 2026Updated last month
- Blog aggregator for pegelinux community☆10Dec 9, 2022Updated 3 years ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- Security audit tool for Django sites☆14Jun 9, 2025Updated 9 months ago
- A python tool to generate an Excel file linking the list of cracked accounts and their LDAP attributes.☆12Jan 31, 2025Updated last year
- A Magisk module which adds custom certificate authorities from a pre-defined path on the Android file system to the system trust store.☆13Nov 12, 2024Updated last year
- Python Library for ConfigExtractor☆15Feb 24, 2026Updated last week
- An another JWT cracker but really fast!☆12Jan 26, 2023Updated 3 years ago
- Open source code for use with Hunchly.☆10May 28, 2018Updated 7 years ago
- Admin for☆16Jun 3, 2018Updated 7 years ago
- 🕵️ An android library to detect ADB debug☆17Jun 29, 2022Updated 3 years ago
- x64 Windows package of the shellcode2exe tool☆14Nov 23, 2020Updated 5 years ago
- API Hooking Engine on Windows 10☆12May 10, 2024Updated last year
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 8 months ago
- ☆18Jun 25, 2024Updated last year
- ☆13Jan 3, 2016Updated 10 years ago
- A different approach to writing BOFs in rust.☆19Aug 20, 2025Updated 6 months ago
- .NET Project for performing Authenticated Remote Execution☆12Nov 22, 2023Updated 2 years ago
- DursVuln - Nmap Scripting Engine (NSE)☆21Jul 16, 2025Updated 7 months ago
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated 11 months ago
- This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offer…☆20May 22, 2025Updated 9 months ago
- Collection of Security Related Examples for Learning Purposes☆13Jan 29, 2016Updated 10 years ago
- ☆16Nov 26, 2024Updated last year
- Vulnerabilities advisories and PoC☆18Nov 21, 2025Updated 3 months ago
- A service container for interacting with SRA's VECTR☆16Apr 9, 2025Updated 11 months ago
- alternative to procdump☆11May 26, 2021Updated 4 years ago
- Malware analysis and Reverse Engineering Workshops from Invoke RE☆15Jun 30, 2024Updated last year
- The Frida Scripts Fetcher & Exploiter tool helps you search and use those scripts to exploit based on the provided search keyword.☆18Aug 5, 2023Updated 2 years ago