ophirharpaz / Patched-Minesweeper
I hacked Minesweeper into putting flags on all the mined squares when starting. Yoohoo.
☆66Updated 6 years ago
Alternatives and similar repositories for Patched-Minesweeper:
Users that are interested in Patched-Minesweeper are comparing it to the libraries listed below
- This repository contains a docker container dedicated to reverse engineering☆83Updated 6 years ago
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆240Updated 7 years ago
- HTTPLeaks - All possible ways, a website can leak HTTP requests☆15Updated 9 years ago
- AKA "Internet Chemotherapy"☆64Updated 7 years ago
- A rogue-USB-device defeat program for Windows.☆188Updated 2 years ago
- ☆140Updated 8 years ago
- Detect embedded cryptocurrency miners based on CPU usage☆20Updated 7 years ago
- Command-line tool that breaks rotating-xor (and similar) ciphertexts☆93Updated 3 years ago
- CVE-2018-20377; 20575; 20576; 20577 Multiple security vulnerabilities affecting latest firmware release on ORANGE Livebox modems.☆74Updated last year
- Medfusion 4000 security research & a MQX RCE.☆335Updated 7 years ago
- A port of Kaitai to the Hiew hex editor☆147Updated 4 years ago
- ☆25Updated 7 years ago
- Linux Memory Cryptographic Keys Extractor☆235Updated last year
- Just a simple radare2 Jupyter kernel☆111Updated 7 years ago
- An example chrome extension to demonstrate the dangers of injecting javascript and html into a page☆35Updated 7 years ago
- ☆350Updated 3 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆151Updated 3 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆97Updated 5 years ago
- Red Team Resources☆59Updated 6 years ago
- ☆25Updated 7 years ago
- Program for extracting TLS keys from Oculus Runtime☆50Updated 4 years ago
- Your bag of handy codes for malware researchers☆121Updated 4 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆93Updated 6 years ago
- WiFi Tracker Confuser☆65Updated 7 years ago
- Program for cryptanalyzing xor "encryption" with variable key length☆42Updated 15 years ago
- Checks Firefox saved passwords against known data leaks using the Have I Been Pwned API.☆85Updated 2 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆97Updated 7 years ago