☆14May 23, 2023Updated 2 years ago
Alternatives and similar repositories for elf_similarity
Users that are interested in elf_similarity are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- ☆13Jun 3, 2020Updated 5 years ago
- NextB的基于敏感哈希的恶意文件相似度比较工具(python版本)☆13Jan 20, 2022Updated 4 years ago
- CobaltStrikeDetect☆49Jun 19, 2025Updated 9 months ago
- Pull some Malware samples here for other security researchers/malware analyst's to analyze and play with.☆173May 29, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆41Apr 5, 2022Updated 4 years ago
- 实时 SFTP 同步工具(单向)☆13May 4, 2018Updated 7 years ago
- QilingLab challenge writeup☆22Sep 25, 2021Updated 4 years ago
- ☆56Oct 22, 2020Updated 5 years ago
- ☆10Dec 24, 2022Updated 3 years ago
- a better basefinder☆12Aug 25, 2021Updated 4 years ago
- Ghidra Loader for ESP32 Flash Dumps☆25Jan 21, 2026Updated 2 months ago
- code for EMNLP2018 paper 'Associative-multichannel-autoencoder for multimodal word representation'☆13Aug 24, 2018Updated 7 years ago
- 一个想让大家赚钱的数字货币量化项目☆13Oct 27, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- parse strace log☆12Oct 16, 2019Updated 6 years ago
- An archive of BASHLITE source code☆13Oct 29, 2016Updated 9 years ago
- Ghidrascripts which will help disassembly of MED9.1 ECUs☆24Apr 7, 2025Updated last year
- 向日葵RCE漏洞批量检测工具☆14Apr 8, 2022Updated 4 years ago
- A skid ripped source of the Dream qBot Botnet developed By Komodo. Leaked By Tiger. Enjoy, it comes with instructions!☆11Oct 5, 2020Updated 5 years ago
- Mass exploitation of CVE-2021-24499 unauthenticated upload leading to remote code execution in Workreap theme.☆16Sep 20, 2021Updated 4 years ago
- ☆15Oct 26, 2021Updated 4 years ago
- ☆12Nov 4, 2019Updated 6 years ago
- ☆20Jan 27, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆18Apr 27, 2018Updated 7 years ago
- Models and code for the paper: In Nomine Function: Naming Functions in Stripped Binaries with Neural Networks☆18Jan 29, 2021Updated 5 years ago
- The dataset was used as a support to attack obfuscations. It is the largest obfuscated dataset, with realistic and various binaries and f…☆19Jan 15, 2026Updated 3 months ago
- vue clickout事件,轻松解决“点击空白处消失”这种问题☆11Aug 7, 2018Updated 7 years ago
- You can access the sigma rules to detect malicious activities. It is organized by Mitre Att&ck categories.☆13Feb 7, 2022Updated 4 years ago
- 二进制学习笔记☆12Oct 14, 2020Updated 5 years ago
- Repo for Bigdata 2019 paper☆14Sep 28, 2021Updated 4 years ago
- Code for the paper "A Lightweight Framework for Function Name Reassignment Based on Large-Scale Stripped Binaries"☆15Jul 3, 2021Updated 4 years ago
- Works about detecting vulnerable using ML.☆87May 2, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A fork of Sebastian Nowozin's and Koji Tsuda's gboost code☆17Mar 5, 2013Updated 13 years ago
- ☆12Dec 26, 2017Updated 8 years ago
- A commandline tool for extracting .ahk files from autohotkey .exe files☆14Aug 9, 2023Updated 2 years ago
- A loadable dll that tracks memory changes, IAT hooks, and dynamically emplaced "JMP" in the x86 host executable.☆12Oct 22, 2023Updated 2 years ago
- ☆23Sep 17, 2019Updated 6 years ago
- This repository contains dynamic and static tools for IoT malware analysis☆21Jul 4, 2022Updated 3 years ago
- Identifying the compiler family, version and compiler flags that generated a binary☆19Dec 19, 2019Updated 6 years ago