-
# Hacker Tools (Updated 2019) Sn1per, Wireshark, Metasploit, Hydra..
##### UPDATED FOR 2019
HACKER TOOLS TOP TEN
--------------------
Since 2014 we’ve listed the web’s…
-
I want to use this module behind cloudflare. But I failed to run it. What does it take to work with CloudFlare?
-
ETA: Public Preview Q4 2023 - Q1 2024
-
It would be nice to finally de-crapify and de-egoify the project fully. Just make a new primary version and go backwards incompatible.
I'm fairly certain the blanket "license change" is also illega…
-
**Bug description**
When one has basic auth enabled on their webserver (such as caddyserver with me) portainer fails to login at all
**Expected behavior**
A proper and safe logn
**Portainer Lo…
-
There are good reasons to move towards value semantics as opposed to pointer semantics for storing PDDL objects. 1) We don't need virtual bases classes but we currently use them, e.g., for conditions,…
-
Not really an issue but how would you get these files up and running on a Chromebook?
I'd love to be able to play some of these games as my school is hella strict on them and I would like a few .html…
-
I have cloned the UI repository and have applied some modifications. How would I go about building the desktop repo using the UI repo? I've tried building the UI repo and putting the dist contents int…
-
# Trending repositories for C#
1. [**Azure / azure-sdk-for-net**](https://github.com/Azure/azure-sdk-for-net)
__This repository is for active development of the Azure SDK for .NET…
-
#72 #159 #517 #551 #589 Are all about the same thing. Obfuscation.
So let me clarify what do we mean when we say 'obfuscation'.
Now Alice send a message to Bob. However, the message go through E…