okeremd / 1C.Icy-TowerLinks
Icy Tower game for CS 319 project
☆11Updated 7 years ago
Alternatives and similar repositories for 1C.Icy-Tower
Users that are interested in 1C.Icy-Tower are comparing it to the libraries listed below
Sorting:
- ☆11Updated 3 years ago
- ☆43Updated 2 weeks ago
- ☆79Updated 3 years ago
- Hack The Box writeups by Şefik Efe.☆16Updated last year
- Wireless Network Security Analysis Tool☆12Updated 5 months ago
- Welcome! I'm Alparslan Akyıldız, an author focusing on cybersecurity and technology. Explore my guides, books, and texts designed to simp…☆72Updated 6 months ago
- 0x94TR Burp Extension - Java version☆31Updated 5 years ago
- Welcome to the secure code review snippets for secure code review snippets! This repository aims to provide developers with valuable exam…☆12Updated 7 months ago
- IDOR testing tool. Coded during Lunizz live stream.☆31Updated 5 years ago
- Multi-Lingual GenAI Red Teaming Tool☆28Updated last year
- In-depth internals, my personal notes, example codes and projects. Includes - Thousands of codes, OOP, Concurrency, Parallelism, Gorouti…☆10Updated 4 years ago
- ☆35Updated 2 years ago
- DIVA (Damn insecure and vulnerable App) is an App intentionally designed to be insecure☆28Updated 4 years ago
- MobiMob is an automatic scanning tool for android penetration test. MobiMob has AndroBugs Framework, Androwarn and APKLeaks. You can star…☆14Updated 3 years ago
- Archive Alchemist is a tool for creating specially crafted archives to test extraction vulnerabilities.☆206Updated 2 months ago
- A comprehensive reconnaissance and vulnerability scanning tool that combines multiple security assessment capabilities into a single auto…☆25Updated 3 months ago
- Secure image creator with wolfi packages.☆43Updated 2 weeks ago
- The precursor project before the great and mighty mycvecom release!☆16Updated 7 months ago
- A web honeypot library to create vulnerable-looking endpoints to detect and mislead attackers☆430Updated 8 months ago
- ⚡ A subdomain enumeration tool leveraging diverse techniques, designed for advanced pentesting operations☆47Updated last week
- Python for Security : Basic Python Security Code Samples☆21Updated 7 years ago
- ⚡ AI-powered directory listing scanner that hunts for exposed secrets and classifies security risks.☆33Updated 3 weeks ago
- Regex patterns for manual application source code review☆32Updated 4 years ago
- ☆68Updated 4 months ago
- A collection of Turbo Intruder scripts.☆66Updated 8 months ago
- Code in the presentation☆20Updated 3 years ago
- An automated GitHub Actions-based crawler that fetches and updates public scopes from popular bug bounty platforms.☆209Updated 5 months ago
- ☆226Updated 2 years ago
- Collection of all previous 1337UP CTF challenges.☆74Updated 9 months ago
- Path Traversal Vulnerability Payload List☆73Updated 2 years ago