ophirharpaz / Patched-MinesweeperLinks
I hacked Minesweeper into putting flags on all the mined squares when starting. Yoohoo.
☆66Updated 7 years ago
Alternatives and similar repositories for Patched-Minesweeper
Users that are interested in Patched-Minesweeper are comparing it to the libraries listed below
Sorting:
- Blogging about reversing "script kiddie" style malware.☆98Updated 9 years ago
- Medfusion 4000 security research & a MQX RCE.☆336Updated 7 years ago
- Command-line tool that breaks rotating-xor (and similar) ciphertexts☆96Updated 2 months ago
- HTTPLeaks - All possible ways, a website can leak HTTP requests☆15Updated 9 years ago
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆240Updated 7 years ago
- Detect embedded cryptocurrency miners based on CPU usage☆20Updated 7 years ago
- ☆25Updated 7 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆153Updated 4 years ago
- Red Team Resources☆60Updated 6 years ago
- Learn the very basics of different languages☆48Updated last month
- WaitList.dat Parser☆26Updated 6 years ago
- ☆143Updated 8 years ago
- A stealth URL toolkit optimized for bypassing censorship filters and/or dropping malware☆106Updated 8 months ago
- A medium interaction printer honeypot 🍯☆202Updated last year
- ☆25Updated 7 years ago
- internet monitoring osint telegram bot for windows☆154Updated 2 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆85Updated 4 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 5 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Updated 7 years ago
- A rogue-USB-device defeat program for Windows.☆188Updated 2 years ago
- Command line tool to generate crafty homograph strings.☆35Updated 3 years ago
- Just a simple radare2 Jupyter kernel☆111Updated 7 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Updated 8 years ago
- a tool to determine the crypto/encoding algorithm used according to traces from its representation☆132Updated 3 years ago
- Funtenna P0C code demonstrated at Blackhat 2015☆90Updated 9 years ago
- New TLS Padding Oracles☆125Updated 2 years ago
- Private keys that have become public ...☆175Updated last month
- ☆167Updated 6 years ago
- Chrome extension to alert and possibly block IDN/Unicode websites and zero-day phishing websites using AI and Computer Vision.☆118Updated 6 years ago
- Schillings SwordPhish empowers organisations and engages its employees to establish the key component of any cyber security strategy: th…☆108Updated 7 years ago