-
-
ronin-support
... by Ronin and additional libraries.
It's like activesupport, but for hacking!
[ronin-rb] is a Ruby platform for exploit development and security research.
Ronin allows for the rapid development and distribution of code, exploits
or payloads over many ...
-
SoundPatty
... driver you will capture, otherwise capturing
might not work.
## TODO ##
Technical debt:
1. Be [consistent][dsl]. Rewrite config.cfg to exploit Lua (and get rid of that
./over.sh).
2. Port old waf tests to cmake.
3. Validate command-line arguments ...
-
PixelMagic
... is a framework that implements HLSL shaders. It features both an interpreter
and a compiler that generates Mono.Simd code that can exploit the full potential of your
CPU. Only PS 2.0 is supported.
Effects can be applied to in-memory buffers or cairo ...
-
hermes
... .py should be saved as an actual file
called some/module/id.min.js to avoid the overhead of script execution and
fully exploit the web server's static file-serving optimization abilities
(gzip, etags, cache headers, &c.). See the included .htaccess file ...
-
NoSQLite
... of SQLite is that it is very flexible. The beauty of Javascript is that it is very flexible.
The goal of NoSQLite is to exploit that even more than other SQLite libraries.
* zero-config - No "create table", "alter table".
* zero-schema - Just store my ...
-
xss
XSS exploit sample site
-
holey-moley
Holey Moley is an exploit scanner framework
[testing...]
== Welcome to Rails
Rails is a web-application framework that includes everything needed to create
database-backed web applications according to the Model-View-Control pattern.
This pattern ...
-
Proman-3
... application in late May 2009. Proman 3 is the second generation of this application, rebuilt from the ground up to exploit the latest innovations in modern Rails application development and to correct some of the major deficiencies of the first deployed ...
-
tellurium
... their attributes, i.e., Composite
Locators denoted by the "clocator". Furthermore, Tellurium uses the Group Locating Concept (GLC) to exploit
information inside a collection of UI components to help finding their locators and the GLC is denoted by the " ...
-
fast-froward
... objective itself is composed of these optimizers. This has an important consequence: the probabilistic programmer can exploit existing tailor-made inference/optimization routines for the tractable structure of its model.
Technically Fast-Forward is ...
-