ophirharpaz / Patched-Minesweeper
I hacked Minesweeper into putting flags on all the mined squares when starting. Yoohoo.
☆66Updated 7 years ago
Alternatives and similar repositories for Patched-Minesweeper:
Users that are interested in Patched-Minesweeper are comparing it to the libraries listed below
- Removed according to regulations☆35Updated 7 years ago
- Medfusion 4000 security research & a MQX RCE.☆336Updated 7 years ago
- A rogue-USB-device defeat program for Windows.☆188Updated 2 years ago
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆240Updated 7 years ago
- This repository contains a docker container dedicated to reverse engineering☆84Updated 6 years ago
- An example chrome extension to demonstrate the dangers of injecting javascript and html into a page☆35Updated 7 years ago
- ☆25Updated 7 years ago
- Basic command line, text-based, shellcode debugger.☆92Updated 7 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆94Updated 7 years ago
- ☆25Updated 7 years ago
- ☆167Updated 5 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 5 years ago
- Command-line tool that breaks rotating-xor (and similar) ciphertexts☆95Updated last month
- Red Team Resources☆59Updated 6 years ago
- WaitList.dat Parser☆26Updated 6 years ago
- free crypto audit☆31Updated 8 years ago
- ☆102Updated 5 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 8 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- CVE-2018-20377; 20575; 20576; 20577 Multiple security vulnerabilities affecting latest firmware release on ORANGE Livebox modems.☆74Updated last year
- A medium interaction printer honeypot 🍯☆202Updated last year
- HTTPLeaks - All possible ways, a website can leak HTTP requests☆15Updated 9 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆152Updated 4 years ago
- New TLS Padding Oracles☆125Updated last year
- File transfer via DNS☆72Updated 7 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Updated 7 years ago
- Twitter as an extra entropy source☆100Updated 6 years ago
- Chrome extension to alert and possibly block IDN/Unicode websites and zero-day phishing websites using AI and Computer Vision.☆118Updated 6 years ago
- A collection of tools for dealing with TrickBot☆199Updated 7 years ago
- ☆142Updated 8 years ago