☆18Mar 20, 2014Updated 12 years ago
Alternatives and similar repositories for explib2
Users that are interested in explib2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- whatweb的插件☆15Aug 15, 2014Updated 11 years ago
- Web Application Firewall Test Script☆14Feb 28, 2023Updated 3 years ago
- Internet Explorer MemoryProtection Mitigation☆32Jul 17, 2014Updated 11 years ago
- ☆11Aug 4, 2015Updated 10 years ago
- Plugin for BinaryNinja that provides bookmarking functionality☆21Feb 11, 2021Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆25Apr 8, 2016Updated 10 years ago
- Example of manipulating Firefox's jemalloc-managed heap☆30Jul 1, 2013Updated 12 years ago
- QuickDefence - Web Application Firewall [ NOT MAINTAINED]☆78Oct 20, 2021Updated 4 years ago
- Slides, codes and videos of the talk "DEP/ASLR bypass without ROP/JIT" on CanSecWest 2013☆48Mar 20, 2013Updated 13 years ago
- Decrypt AES256GCM-encrypted data in Apple Pay Payment Tokens.☆11Nov 30, 2018Updated 7 years ago
- Automatic Compartments for Embedded Systems☆24Mar 6, 2020Updated 6 years ago
- 基于nginx lua module 的一个 waf .☆117Sep 12, 2013Updated 12 years ago
- HitCon 2014 : IE 11 0day & Windows 8.1 Exploit☆24Aug 25, 2014Updated 11 years ago
- ☆38Jul 4, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- 🌌 Go-Observe: A command line Mozilla Observatory client written in Go☆12Feb 9, 2017Updated 9 years ago
- A collection of vulnerable web applications in Node.js to practice security fundamentals☆13May 5, 2016Updated 10 years ago
- ☆10Aug 13, 2015Updated 10 years ago
- Windows 8.1 + IE 11 Exploit☆16Jul 26, 2016Updated 9 years ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- ☆49Jan 11, 2019Updated 7 years ago
- Security benchmarks for the Internet of Things☆22Nov 11, 2020Updated 5 years ago
- ☆13May 12, 2014Updated 12 years ago
- Database takeover UDF repository☆184Mar 11, 2018Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆13Jun 13, 2016Updated 9 years ago
- PoC for Foxit Reader CVE-2018-14442☆58Dec 28, 2018Updated 7 years ago
- ☆10Aug 26, 2016Updated 9 years ago
- ☆91Feb 22, 2021Updated 5 years ago
- 自己ctf比赛的writeup☆19May 27, 2019Updated 6 years ago
- Phishing Toolkit☆19Feb 20, 2018Updated 8 years ago
- windows kernel vulnerability found by me☆88Aug 28, 2017Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31May 10, 2016Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Ambush Host Intrusion Prevention System☆65Sep 8, 2013Updated 12 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- webshell writen in python☆154Oct 1, 2020Updated 5 years ago
- ☆81Jun 12, 2017Updated 8 years ago
- Pivoting framework☆16Jun 5, 2016Updated 9 years ago
- Everything related to Cobalt Strike☆15Feb 3, 2020Updated 6 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Dec 19, 2016Updated 9 years ago