The Django backend running RACTF wargame events.
☆25Dec 6, 2024Updated last year
Alternatives and similar repositories for core
Users that are interested in core are comparing it to the libraries listed below
Sorting:
- Run out-of-box multiarch Debian system on QEMU via tcg emulation.☆31Feb 5, 2026Updated 3 weeks ago
- The artifact for NDSS '25 paper "ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environmen…☆14Oct 16, 2025Updated 4 months ago
- Linux kernel source tree☆10Oct 11, 2017Updated 8 years ago
- Web interface to IntelMQ☆10Sep 10, 2025Updated 5 months ago
- Virtual Audio Loopback Cable for Windows☆10Sep 18, 2022Updated 3 years ago
- Implementation of unregularized, l1 regularized and l2 regularized linear regression using numpy and without sklearn☆12Oct 4, 2019Updated 6 years ago
- Burp extension to automatically drop requests that match a certain regex.☆10Mar 10, 2023Updated 2 years ago
- Native desktop client for slack.com☆10May 23, 2018Updated 7 years ago
- Lightweight, ad-free Android app that shows caller names in a popup using Truecaller API—no need for the full Truecaller app. Just tap St…☆26Nov 18, 2025Updated 3 months ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆10Sep 11, 2020Updated 5 years ago
- Command line language server protocol client (LSPC)☆11Jul 31, 2018Updated 7 years ago
- PPT of my talks.☆13Jun 23, 2025Updated 8 months ago
- A Pratt (TDOP) Expression Parser Library for Java☆10Dec 31, 2020Updated 5 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago
- List of AI-powered code editor and IDE's sorted by minimal price☆19Feb 13, 2026Updated 2 weeks ago
- ☆21Feb 10, 2026Updated 2 weeks ago
- ☆13Aug 28, 2018Updated 7 years ago
- AI powered automatic software healing agent☆23Jan 28, 2025Updated last year
- SoC-independent part of the iso7816 stack☆13Feb 28, 2024Updated 2 years ago
- ACI-GetStarted☆11Jun 4, 2025Updated 8 months ago
- Scan IPv4 prefixes for DNS revolvers and classify them as open/closed☆10Jun 19, 2014Updated 11 years ago
- A PDF that shows its own MD5☆11Jan 2, 2023Updated 3 years ago
- Offensive tool for guessing Active Directory credentials via Kerberos☆10Jan 1, 2024Updated 2 years ago
- wannabe (up-to-date) 64bit port of lguest☆14May 11, 2011Updated 14 years ago
- Dev resources of Harmony☆15Mar 4, 2024Updated last year
- ☆12Apr 1, 2025Updated 10 months ago
- Centos6/7一键清理内核☆10Mar 10, 2020Updated 5 years ago
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- The ICS^2 Matrix is a threat taxonomy for Programmable Logic Controllers and Industrial Control Systems☆13Sep 10, 2024Updated last year
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- fanotify cron system☆21Sep 15, 2015Updated 10 years ago
- Sample code for ret2usr (and ret2dir) kernel attacks☆10Nov 23, 2016Updated 9 years ago
- Get the best daily repositories☆10Updated this week
- Fuzzing Secure Monitor Implementations☆19Aug 3, 2024Updated last year
- Integration fork of QEMU focusing on XNU platforms (arm, aarch64, etc)☆12Dec 12, 2022Updated 3 years ago
- General purpose task runner☆10Nov 10, 2025Updated 3 months ago
- Fork of QEMU with Virtual Machine Introspection patches☆14Sep 13, 2023Updated 2 years ago
- ☆11Mar 19, 2019Updated 6 years ago
- Cloudflare worker as a web proxy☆10May 4, 2022Updated 3 years ago