Automatically exported from code.google.com/p/checkout4mac
☆13Oct 24, 2016Updated 9 years ago
Alternatives and similar repositories for checkout4mac
Users that are interested in checkout4mac are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Quantum Insert Backdoor POC☆11May 21, 2017Updated 8 years ago
- runtime code injector for Linux☆26May 29, 2011Updated 14 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- ☆23Sep 21, 2014Updated 11 years ago
- ☆12Dec 26, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- BrundleFuzz is a distributed fuzzer for Windows and Linux using dynamic binary instrumentation.☆82Sep 10, 2016Updated 9 years ago
- Baseline IoT security checklist. Consider security as early in development as possible and reap the rewards.☆30Aug 25, 2017Updated 8 years ago
- svn cloner is a kit for downloading source code through .svn info.☆16Sep 12, 2012Updated 13 years ago
- Misc IDA Pro scripts☆23Oct 17, 2016Updated 9 years ago
- frameworks_base for Geeksphone Peak and Keon☆12Jan 13, 2015Updated 11 years ago
- Post-CTF writeups☆12Oct 28, 2016Updated 9 years ago
- ☆11Feb 20, 2015Updated 11 years ago
- A fuzzing utility for Android that focuses on reporting and delivery portions of the fuzzing process☆39Sep 4, 2014Updated 11 years ago
- ☆16Jan 29, 2016Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Wireshark Post-Descriptors written in LUA☆13Apr 2, 2020Updated 6 years ago
- Multiple XSS Pocs (some server via gh-pages)☆16Feb 17, 2017Updated 9 years ago
- ☆63May 22, 2014Updated 11 years ago
- Python scripts for gdb, reverse engineering oriented☆16Sep 20, 2016Updated 9 years ago
- Linux Kernel Module Debugger☆15Sep 27, 2016Updated 9 years ago
- ☆12Jun 29, 2021Updated 4 years ago
- Verification Validation and Visualization of Security Policy Abstractions☆45Aug 14, 2023Updated 2 years ago
- Tool/service to detect Man in the Middle attacks with Canary Requests☆56Oct 8, 2016Updated 9 years ago
- Android tool based on arp security!☆11Jul 11, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A small utility to read and write to Macs physical memory using default AppleHWAccess.kext.☆25Sep 3, 2015Updated 10 years ago
- Very simple example of how to detect if the device is jailbroken. This is not the most efficient way but it will work in most cases.☆18Mar 12, 2016Updated 10 years ago
- LG On Screen Phone authentication bypass PoC (CVE-2014-8757)☆15Feb 6, 2015Updated 11 years ago
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Nov 10, 2020Updated 5 years ago
- Don't let *them* read your mail. Encrypt it now.☆18Jun 13, 2018Updated 7 years ago
- An Android port of the melkor ELF fuzzer☆64Aug 21, 2014Updated 11 years ago
- Tools for Cellular Exploitation on a Global Scale - Blackhat USA 2014☆24Feb 12, 2018Updated 8 years ago
- Expolit for android (goldfish kernel v3.10.0+) on arm64 with PXN&SELinux Bypassed. Based on fi01's code.☆19Jan 3, 2017Updated 9 years ago
- System call fuzzing of OpenBSD amd64 using TriforceAFL (i.e. AFL and QEMU)☆46Dec 1, 2017Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆80Oct 10, 2014Updated 11 years ago
- modernized and C99 compliant port of p0f (Passive OS fingerprinting)☆20Sep 17, 2018Updated 7 years ago
- ☆49Mar 1, 2022Updated 4 years ago
- A PoC demonstrating techniques exploiting CVE-2016-5696 Off-Path TCP Exploits: Global Rate Limit Considered Dangerous☆40Aug 23, 2016Updated 9 years ago
- Spark MLib Training Models for Network Security☆16Mar 19, 2018Updated 8 years ago
- ChatSecure for OS X☆12Mar 27, 2017Updated 9 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Feb 6, 2017Updated 9 years ago