ophirharpaz / Patched-Minesweeper
I hacked Minesweeper into putting flags on all the mined squares when starting. Yoohoo.
☆66Updated 6 years ago
Alternatives and similar repositories for Patched-Minesweeper:
Users that are interested in Patched-Minesweeper are comparing it to the libraries listed below
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆240Updated 7 years ago
- ☆25Updated 7 years ago
- Here's a quick rundown of how I reversed the Casper API (https://casper.io)☆58Updated 7 years ago
- NASM Standard Library for shellcode☆69Updated 8 years ago
- Basic command line, text-based, shellcode debugger.☆92Updated 7 years ago
- Slack bot for challenge management in large teams☆60Updated 2 years ago
- A rogue-USB-device defeat program for Windows.☆188Updated 2 years ago
- A simple cryptosystem that provides provable plausibly deniable encryption.☆87Updated 6 years ago
- A medium interaction printer honeypot 🍯☆202Updated last year
- Command-line tool that breaks rotating-xor (and similar) ciphertexts☆95Updated last week
- Run basic functions from stripped binaries cross platform☆111Updated 8 years ago
- Learn the very basics of different languages☆48Updated 2 years ago
- WaitList.dat Parser☆26Updated 6 years ago
- This repository contains a docker container dedicated to reverse engineering☆84Updated 6 years ago
- Your bag of handy codes for malware researchers☆120Updated 5 years ago
- BitErrant☆58Updated 8 years ago
- Radare 2 wiki☆91Updated 4 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Updated 8 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆98Updated 7 years ago
- Red Team Resources☆59Updated 6 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆93Updated 7 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆55Updated 7 years ago
- ☆25Updated 7 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 7 years ago
- ☆44Updated last month
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- HTTPLeaks - All possible ways, a website can leak HTTP requests☆15Updated 9 years ago
- Program for cryptanalyzing xor "encryption" with variable key length☆44Updated 15 years ago
- ASM Malicious code - PE infector☆70Updated 8 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago