☆15Aug 11, 2020Updated 5 years ago
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- ☆11Jan 6, 2020Updated 6 years ago
- This is both a terrible and wonderful idea.☆12Oct 2, 2019Updated 6 years ago
- An algebra system written in OCaml☆10Sep 20, 2015Updated 10 years ago
- Gesture controlled music glove with two microbits☆11Jun 18, 2022Updated 3 years ago
- Simulation engine involving a 2D universe populated by cells and entities☆10Jun 14, 2023Updated 2 years ago
- ☆11Mar 26, 2018Updated 7 years ago
- A .io game written using Elixir/Phoenix and WebAssembly☆13Nov 20, 2018Updated 7 years ago
- a basic peniscoin miner in python☆11Jun 12, 2014Updated 11 years ago
- A rogue DNS detector☆24Nov 20, 2025Updated 4 months ago
- Undefined Behaviour Snippets☆17Apr 3, 2017Updated 8 years ago
- python scripts☆15Dec 5, 2019Updated 6 years ago
- ☆22Sep 26, 2025Updated 5 months ago
- A tool for analyzing syntactic and semantic properties of C Preprocessor macros in C programs☆12Aug 27, 2025Updated 6 months ago
- Small project hoster. Can deploy static websites + Dockerfiles and provide a management TUI client.☆19Aug 23, 2024Updated last year
- Minimal setup to trigger the xz backdoor☆29Oct 19, 2024Updated last year
- Initial Rust implementation of FAEST☆13Jul 6, 2023Updated 2 years ago
- ☆11Dec 29, 2023Updated 2 years ago
- A CTF game for recovering a DSA private key.☆10Apr 21, 2020Updated 5 years ago
- AFL++ with support for FormatFuzzer☆18May 28, 2025Updated 9 months ago
- ☆10Feb 13, 2023Updated 3 years ago
- Network Traffic Fuzzer☆17Dec 28, 2024Updated last year
- An LR(1) parser generator, implemented as a proc macro☆16Apr 21, 2023Updated 2 years ago
- A directory of companies, people, and projects that are Open Source and from Tokyo☆18Sep 26, 2017Updated 8 years ago
- TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Head…☆20Mar 29, 2020Updated 5 years ago
- The magic number 0x5F3759DF in Python3 Fast Inverse SquareRoot☆12Mar 5, 2023Updated 3 years ago
- ☆10Feb 27, 2024Updated 2 years ago
- QL Workshop☆16Sep 30, 2019Updated 6 years ago
- Restore image using NAFNet model with streamlit dashboard☆12Jul 27, 2023Updated 2 years ago
- Base58 to Ripemd160 converter☆12Mar 20, 2021Updated 5 years ago
- ☆15Jul 25, 2019Updated 6 years ago
- A series of Jupyter notebooks for those wanting to learn Python through applications to mathematics.☆14Feb 21, 2023Updated 3 years ago
- Framework for in-VM test execution and monitoring, inspired by Sandsifter☆15Updated this week
- My talks on zk: Groth16, Plonk, and STARK☆12Aug 22, 2024Updated last year
- Inspired by people being dumb☆10Jan 2, 2017Updated 9 years ago
- Listen to the weather using Sonic Pi and data from Mathematica☆11Dec 6, 2018Updated 7 years ago
- Polynomial Matrix Library. Additions to NTL and FLINT libraries, with a focus on univariate polynomial matrices, structured matrices, and…☆22Jan 22, 2026Updated 2 months ago
- cryptocounters for our PETs☆24Nov 18, 2012Updated 13 years ago
- A neural network using fuzzing-style feedback rather than back-propagation☆18Aug 12, 2020Updated 5 years ago