'SWEETMON' is a fuzzer monitoring service based python3 + django. User can check their fuzzers and crashes on the web. It can reduce repetitive work for fuzz testers. This is a legacy sweetmon. The new sweetmon is now being developed https://github.com/sweetchipsw/sweetmon2
☆17Jun 5, 2020Updated 5 years ago
Alternatives and similar repositories for Sweetmon_legacy
Users that are interested in Sweetmon_legacy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 'SWEETMON2' is a fuzzer monitoring service based Python3 + Django2. User can manage their fuzzers and crashes on the web. It can reduce r…☆10Jun 5, 2020Updated 5 years ago
- *For research purposes only*. Some proof of concept code to trig vulnerability or exploit them that I found before.☆25Oct 24, 2025Updated 5 months ago
- Django middleware to view exception debugging page only allowed IP☆14Oct 24, 2017Updated 8 years ago
- collection of translation documents.☆16Mar 31, 2019Updated 6 years ago
- Efficient Preprocessor of Assembly Code to Detect Software Weakness with CNN☆37Jul 6, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Exploit for hardcore pwnable☆35Apr 14, 2019Updated 6 years ago
- Android malware static & dynamic analysis and automated action (deprecated)☆21May 18, 2021Updated 4 years ago
- finals-2014☆20Nov 15, 2016Updated 9 years ago
- Guessing number with Genetic Algoithm☆12Feb 17, 2021Updated 5 years ago
- 대학교 모의 시간표 서비스☆12Aug 3, 2016Updated 9 years ago
- Transliteration with ✌️ Machine Learning ✌️☆11Jul 12, 2018Updated 7 years ago
- windows utility code☆88Mar 21, 2026Updated last week
- ☆15Mar 25, 2017Updated 9 years ago
- ctf exploit codes or writeups☆159Dec 9, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Samsung CTF 2017 Problems. https://sctf.codeground.org☆24Sep 3, 2018Updated 7 years ago
- Predicting League of Legend Game Results with ML☆16Apr 20, 2017Updated 8 years ago
- Minifilter driver development Hands-On-Labs☆118Aug 22, 2018Updated 7 years ago
- blockchain implementation for beginners☆12Aug 3, 2020Updated 5 years ago
- adversarial machine learning for anti-malware software☆12May 17, 2018Updated 7 years ago
- KIISC Digital Forensics Challenge 2023 - Kimbabasaksaksak's WriteUp☆24Feb 27, 2026Updated last month
- A Data Visualization of Box Office History.☆18Mar 24, 2015Updated 11 years ago
- A collection of links related to Korean products hacking☆97Feb 19, 2026Updated last month
- 🇰🇷 Realtime integrated information analysis service☆20May 1, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- 오실로스코프는 내가 사기엔 너무 비싸...고로 만들어보자!☆14Sep 10, 2019Updated 6 years ago
- Easy way to create Python projects. (formerly flask-init)☆46Oct 1, 2020Updated 5 years ago
- eXtremely fast data eXtraction via blind SQL injection☆14Aug 15, 2012Updated 13 years ago
- ☆51Mar 23, 2018Updated 8 years ago
- Introduction to Open Source Software class @ KAIST 2016☆38Jan 24, 2017Updated 9 years ago
- drawing docker icon☆10Jun 11, 2017Updated 8 years ago
- Collection of scripts and how-to for hacking embedded devices☆22Feb 16, 2026Updated last month
- Chain-of-thought 방식을 활용하여 llama2를 fine-tuning☆10Nov 18, 2023Updated 2 years ago
- ☆30Aug 31, 2015Updated 10 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Sha256 vulnerability for full rounds. Circular hash attack.☆156Jun 28, 2017Updated 8 years ago
- Official write-up for Speed Hack event at POC2017☆15Nov 11, 2017Updated 8 years ago
- Compromising the macOS Kernel through Safari by Chaining Six Vulnerabilities☆413Mar 19, 2021Updated 5 years ago
- Chrome V8 exploit guide for starter from build to exploit in Korean. If This has incorrect information, Please let me know, Chrome V8 Ex…☆162Apr 13, 2019Updated 6 years ago
- A Programming Language for Games: performance, data-oriented, and so on.☆11Jul 11, 2017Updated 8 years ago
- A simple script for exploit RCE for Struts 2 S2-053(CVE-2017-12611)☆37Sep 8, 2017Updated 8 years ago
- 한자 도메인, 안 돼!☆35Aug 9, 2018Updated 7 years ago