ophirharpaz / Patched-MinesweeperLinks
I hacked Minesweeper into putting flags on all the mined squares when starting. Yoohoo.
☆66Updated 7 years ago
Alternatives and similar repositories for Patched-Minesweeper
Users that are interested in Patched-Minesweeper are comparing it to the libraries listed below
Sorting:
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆239Updated 7 years ago
- A rogue-USB-device defeat program for Windows.☆189Updated 3 years ago
- HTTPLeaks - All possible ways, a website can leak HTTP requests☆15Updated 9 years ago
- ☆352Updated 4 years ago
- A medium interaction printer honeypot 🍯☆202Updated 2 years ago
- AKA "Internet Chemotherapy"☆64Updated 7 years ago
- Blogging about reversing "script kiddie" style malware.☆98Updated 10 years ago
- IOHIDFamily 0day☆444Updated 2 years ago
- Sandboxed, Rust-based, Windows Defender Client☆181Updated 8 years ago
- Avast JavaScript Interactive Shell☆675Updated 5 years ago
- Medfusion 4000 security research & a MQX RCE.☆338Updated 7 years ago
- Just a simple radare2 Jupyter kernel☆111Updated 7 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆153Updated 4 years ago
- Don't Skype & Type! Keyboard acoustic eavesdropping tool.☆319Updated 6 years ago
- International Journal of Proof-of-Concept or Get The F*** Out (PoC||GTFO or PoC or GTFO)☆185Updated last year
- Private keys that have become public ...☆183Updated last week
- Chrome extension to alert and possibly block IDN/Unicode websites and zero-day phishing websites using AI and Computer Vision.☆119Updated 7 years ago
- ☆144Updated 8 years ago
- Summary and archives of leaked Russian TLD DNS data☆187Updated 8 years ago
- New TLS Padding Oracles☆125Updated 2 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆97Updated 5 years ago
- WaitList.dat Parser☆26Updated 6 years ago
- Detect embedded cryptocurrency miners based on CPU usage☆20Updated 7 years ago
- This repository contains a docker container dedicated to reverse engineering☆85Updated 6 years ago
- Linux Memory Cryptographic Keys Extractor☆238Updated 2 years ago
- Twitter as an extra entropy source☆104Updated 7 years ago
- Password scrambler - a deterministic password re-generator (alternative to a password manager)☆130Updated 2 years ago
- ☆25Updated 8 years ago
- A big list of space book and whitepaper recommendations.☆100Updated 5 years ago
- A collection of crackmes☆40Updated 7 months ago