ophirharpaz / Patched-MinesweeperLinks
I hacked Minesweeper into putting flags on all the mined squares when starting. Yoohoo.
☆66Updated 7 years ago
Alternatives and similar repositories for Patched-Minesweeper
Users that are interested in Patched-Minesweeper are comparing it to the libraries listed below
Sorting:
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆239Updated 8 years ago
- This repository contains a docker container dedicated to reverse engineering☆84Updated 7 years ago
- Command-line tool that breaks rotating-xor (and similar) ciphertexts☆98Updated 8 months ago
- Medfusion 4000 security research & a MQX RCE.☆339Updated 7 years ago
- A rogue-USB-device defeat program for Windows.☆189Updated 3 years ago
- Private keys that have become public ...☆184Updated last week
- International Journal of Proof-of-Concept or Get The F*** Out (PoC||GTFO or PoC or GTFO)☆185Updated last year
- Just a simple radare2 Jupyter kernel☆111Updated 7 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 6 years ago
- HTTPLeaks - All possible ways, a website can leak HTTP requests☆15Updated 10 years ago
- Avast JavaScript Interactive Shell☆675Updated 5 years ago
- IOHIDFamily 0day☆444Updated 2 years ago
- ☆352Updated 4 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆153Updated 4 years ago
- ☆25Updated 8 years ago
- Learn the very basics of different languages☆49Updated 7 months ago
- A portable reverse engineering environment using docker.☆214Updated 7 years ago
- Factoring as a Service☆273Updated 4 months ago
- WaitList.dat Parser☆26Updated 7 years ago
- AKA "Internet Chemotherapy"☆66Updated 7 years ago
- Linux Memory Cryptographic Keys Extractor☆239Updated 2 years ago
- ☆38Updated 8 years ago
- Sandboxed, Rust-based, Windows Defender Client☆180Updated 8 years ago
- Summary and archives of leaked Russian TLD DNS data☆186Updated 8 years ago
- BitErrant☆59Updated 8 years ago
- Don't Skype & Type! Keyboard acoustic eavesdropping tool.☆317Updated 6 years ago
- A medium interaction printer honeypot 🍯☆202Updated 2 years ago
- ☆221Updated 5 years ago
- Proof of concept of LibreOffice remote arbitrary file disclosure vulnerability☆96Updated 7 years ago
- ☆147Updated 9 years ago