nickboucher / bidi-viewer
Utility to quickly view bidirectional encodings for code hosted online
☆22Updated 3 years ago
Alternatives and similar repositories for bidi-viewer:
Users that are interested in bidi-viewer are comparing it to the libraries listed below
- ☆24Updated 3 years ago
- Fork of Microsoft's fork of OpenOCD - this one being with Tamarin support and pre-built binaries.☆11Updated 4 months ago
- Security. Automation. Analytics.☆54Updated last year
- ARP Man-in-the-Middle tool☆28Updated 2 months ago
- Vulnerability and security bulletins related to Palantir software products.☆13Updated last year
- Selenium based web scraper to generate passwords list☆51Updated 4 years ago
- Public exploits☆15Updated 6 years ago
- fanny.bmp MALWARE - ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! (incl Metasploit detection Module)☆39Updated 10 months ago
- The open ransomware payment tracker☆91Updated 3 months ago
- CryDecryptor is an Android application to decrypt files from device compromised by the CryCryptor ransomware☆15Updated 4 years ago
- Ghidra script for extracting embedded Rust crate dependency strings from a compiled Rust binary☆29Updated 2 years ago
- The new CVE website☆76Updated this week
- PoC of proxylogon chain SSRF(CVE-2021-26855) to write file by testanull, censored by github☆7Updated 3 years ago
- World's fastest and most advanced GPGPU-based password recovery utility☆29Updated 3 months ago
- Proof-of-concept for Spook.js☆70Updated 3 years ago
- A client and library to cve-services 2.x to provide CVE management for CNA and CERTs☆21Updated this week
- Public Issue tracker to gather feedback for and allow discussions around Malpedia☆34Updated 2 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆47Updated 2 years ago
- ☆62Updated 6 months ago
- ☆15Updated 2 years ago
- A possible method for faster-than-light communication☆43Updated last year
- ☆48Updated 2 years ago
- XOR Key Extractor☆50Updated 6 months ago
- Supporting files for the Chinese State-Sponsored Cyber Operations: Observed TTPs Cybersecurity Advisory. #nsacyber☆42Updated 3 years ago
- ☆22Updated 2 years ago
- Threatfox Censys is a tool to query Censys Search for IP addresses and domains and then parses the JSON and submits the results to Threat…☆33Updated 3 weeks ago
- ☆23Updated last year
- Collected and authored guides for personal and operational security.☆58Updated 2 years ago
- Companion Worm research☆15Updated 3 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 2 years ago