☆15Feb 19, 2020Updated 6 years ago
Alternatives and similar repositories for handbook
Users that are interested in handbook are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- Fully functional & encrypted chat-application.☆11Mar 28, 2024Updated 2 years ago
- 寻找可注入进程☆13Jul 16, 2020Updated 5 years ago
- Experimental python3.x based ICMP bind shell listener using scapy and windows 'compatible'☆10May 29, 2020Updated 5 years ago
- A better way to write shell code☆11May 28, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- CERT Australia Cyber Threat Intelligence (CTI) Toolkit☆15Nov 11, 2017Updated 8 years ago
- A Modern Approach☆10Sep 5, 2015Updated 10 years ago
- Collection of exploits that were verified by an automated system☆13Jun 17, 2021Updated 4 years ago
- 聚合交易平台BitLeague☆11Sep 30, 2018Updated 7 years ago
- A template to make injected DLLs for modding☆11Dec 17, 2020Updated 5 years ago
- HWP Document Fuzzer (Simple OLE Structure Parsing)☆15Dec 30, 2014Updated 11 years ago
- Articles accumulated by the 360Quake team.☆15Jun 18, 2021Updated 4 years ago
- 工业控制系统中实时篡改TE传感器与PLC可编程逻辑控制之间的Modbus/TCP通信数据☆13Jun 17, 2019Updated 6 years ago
- Framework for Rogue Wi-Fi Access Point Attack☆12Aug 31, 2015Updated 10 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆13Dec 21, 2020Updated 5 years ago
- This is a fuzzer for Windows SEH buffer overflow.☆15Oct 17, 2017Updated 8 years ago
- Browser Fuzzing with Machine Learning☆22Mar 6, 2019Updated 7 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Apr 10, 2020Updated 5 years ago
- automatic classification of ETFs in Portfolio Performance using holding lists☆14Nov 22, 2020Updated 5 years ago
- This batch script file wants to check your EDR systems detection and response capabilities in a more noisy way!☆12Jul 3, 2020Updated 5 years ago
- A summary of NSO Group/Circles documents, research and media clippings.☆12Apr 13, 2024Updated last year
- 日常积累,用以保存学习或比赛中遇到的漏洞复现文件,会有一些基本的说明文件☆18Apr 24, 2021Updated 4 years ago
- A simple application to find open source repos fighting Covid / Corona virus☆12Jun 10, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This repository stores the proof-of-concept of Windows malware categorized with MITRE ATT&CK.☆14Nov 8, 2024Updated last year
- KiMi 漏洞感知机器人扫描框架 @KiMi-VulnBot @KiMiThreatPerception☆23Jul 25, 2017Updated 8 years ago
- Collection of modified open fuzzer.☆30Jun 9, 2012Updated 13 years ago
- ☆14Feb 22, 2021Updated 5 years ago
- random python stuff☆26Jan 7, 2016Updated 10 years ago
- ☆18Dec 17, 2015Updated 10 years ago
- Formbricks Design Team Repository.☆23Jun 7, 2023Updated 2 years ago
- DGA detection project that aims to rapidly build and deploy a machine learning system to detect domain names generated by malware.☆17Jan 29, 2019Updated 7 years ago
- ML research on software vulnerabilities☆18Sep 8, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆11Nov 27, 2022Updated 3 years ago
- Static Php Analysis and Fuzzer☆26Apr 22, 2014Updated 11 years ago
- A simple recommendation engine (by way of convolutions and embeddings) written in TensorFlow☆20Jun 5, 2017Updated 8 years ago
- ☆11Dec 2, 2024Updated last year
- ☆19Mar 31, 2019Updated 6 years ago
- Exploit Firefox Vulnerability☆24May 25, 2020Updated 5 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆31May 10, 2022Updated 3 years ago