TAODOS stands for The Art of Denial-of-Service
☆16Jul 2, 2021Updated 4 years ago
Alternatives and similar repositories for TAODOS
Users that are interested in TAODOS are comparing it to the libraries listed below
Sorting:
- This is a tiny Chrome Extension that protects your from Clipboard XSS Attacks☆19Mar 30, 2015Updated 10 years ago
- Collection of my capture-the-flag web challenge in any levels☆120Jan 19, 2023Updated 3 years ago
- Redis Security Map - Anti-hacking for Redis☆31Mar 11, 2022Updated 4 years ago
- Pentest Q&A trick written in Vietnamese☆11May 16, 2019Updated 6 years ago
- Vulnerable LLM Application☆14Jan 1, 2024Updated 2 years ago
- Redis based IP blacklist and limit for Nginx☆12Jun 16, 2016Updated 9 years ago
- ☆15Apr 13, 2021Updated 4 years ago
- A set of scripts to help automate the management of Burp Collaborator☆13Sep 5, 2025Updated 6 months ago
- Something To Do Android Application Security Research☆10May 14, 2021Updated 4 years ago
- A little tool to execute functions without debugging an entire executable. Originally written by Gonzalo J. Carracedo (BatchDrake).☆29Apr 6, 2014Updated 11 years ago
- ☆18Feb 16, 2021Updated 5 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆11Mar 12, 2026Updated last week
- ☆14Jan 5, 2021Updated 5 years ago
- Download a Bunch of Malware for Demos and Testing☆13Sep 28, 2018Updated 7 years ago
- ☆10Nov 2, 2023Updated 2 years ago
- 3D Accelerated Exploitation☆54Feb 22, 2019Updated 7 years ago
- [WIP] a simple UI for Vulhub☆16Jun 10, 2021Updated 4 years ago
- IDASimulator is a plugin that extends IDA's conditional breakpoint support, making it easy to augment / replace complex executable code i…☆46Sep 2, 2014Updated 11 years ago
- ☆103Jan 3, 2022Updated 4 years ago
- Python bindings for the Hexrays Decompiler☆88Dec 25, 2021Updated 4 years ago
- Universal Malware Sample Encryption☆13Jan 5, 2024Updated 2 years ago
- Hands-On Penetration Testing on Windows, published by Packt☆27Jan 18, 2023Updated 3 years ago
- ☆15Jun 5, 2019Updated 6 years ago
- Progress of learning kernel development☆14Nov 20, 2022Updated 3 years ago
- Links or additional data to some researches☆14May 24, 2019Updated 6 years ago
- Collection of cracked malware☆15Dec 28, 2018Updated 7 years ago
- Triton based symbolic emulator☆16Oct 30, 2022Updated 3 years ago
- Una super pragmática selección de herramientas Javascript para distintos tipos de proyectos.☆10Aug 2, 2020Updated 5 years ago
- The tool that help convert php function to php noAlnum-function☆45Jun 14, 2018Updated 7 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Feb 13, 2017Updated 9 years ago
- cve-2019-0604 SharePoint RCE exploit☆101Oct 18, 2019Updated 6 years ago
- ☆68Mar 15, 2024Updated 2 years ago
- Wordlists for Wfuzz or Dirbuster☆26Feb 19, 2016Updated 10 years ago
- A sinkhole for collecting and analysing malicious traffic☆17Sep 12, 2020Updated 5 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- UI fuzz testing in headless chromium. Let a monkey with a typewriter augment your QA process.☆13Mar 7, 2024Updated 2 years ago
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Feb 19, 2021Updated 5 years ago
- Sites and URLs on software and securities that I hope to learn from you guys☆44Jan 19, 2021Updated 5 years ago