☆48Aug 7, 2019Updated 6 years ago
Alternatives and similar repositories for Slides
Users that are interested in Slides are comparing it to the libraries listed below
Sorting:
- Tool for analysis of Windows Prefetch files☆26Nov 11, 2018Updated 7 years ago
- repo for ctf☆22Apr 15, 2018Updated 7 years ago
- A PoC demonstrating techniques exploiting CVE-2016-5696 Off-Path TCP Exploits: Global Rate Limit Considered Dangerous☆40Aug 23, 2016Updated 9 years ago
- Open-CTF based on Christmas CTF Platform☆11Feb 25, 2016Updated 10 years ago
- Fix acquired .evt - Windows Event Log files (Forensics)☆18Mar 29, 2016Updated 9 years ago
- ☆10Aug 26, 2016Updated 9 years ago
- ☆38Jul 4, 2016Updated 9 years ago
- malware-traffic-analysis.net PCAPs repository.☆37Jun 9, 2016Updated 9 years ago
- PyMal is a python based interactive Malware Analysis Framework. It is built on the top of three pure python programes Pefile, Pydbg and V…☆44Jul 10, 2016Updated 9 years ago
- Snoop Component Suite☆12Feb 24, 2015Updated 11 years ago
- XTM F학점 공대형 낚시 편 장비☆10Oct 26, 2016Updated 9 years ago
- Digitalis's Security Lab☆10Mar 10, 2022Updated 3 years ago
- 2018 TenDollar CTF☆30Dec 5, 2018Updated 7 years ago
- Presentations☆10Oct 2, 2017Updated 8 years ago
- ☆12Sep 10, 2019Updated 6 years ago
- Samsung CTF 2018 Problems. https://research.samsung.com/sctf2018☆14Dec 27, 2019Updated 6 years ago
- adversarial machine learning for anti-malware software☆12May 17, 2018Updated 7 years ago
- All Presentations at CodeEngn Conference☆106Jul 6, 2025Updated 7 months ago
- Webzen Data Analysis Tool Library☆21Jul 9, 2018Updated 7 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆13Jun 12, 2017Updated 8 years ago
- library and intepreter for penetration testing tools☆30Apr 10, 2016Updated 9 years ago
- A simple script for exploit RCE for Struts 2 S2-053(CVE-2017-12611)☆37Sep 8, 2017Updated 8 years ago
- Frontend for Codex Gigas☆21Mar 6, 2017Updated 8 years ago
- A Jenkins Pentest/Security Toolkit written in Python☆15Sep 18, 2017Updated 8 years ago
- A Distinctive Ransomeware.☆27Aug 16, 2016Updated 9 years ago
- A Data Visualization of Box Office History.☆18Mar 24, 2015Updated 10 years ago
- ☆18Jun 21, 2019Updated 6 years ago
- collection of translation documents.☆16Mar 31, 2019Updated 6 years ago
- finals-2014☆20Nov 15, 2016Updated 9 years ago
- dForensics Tools☆22Sep 12, 2015Updated 10 years ago
- This code is vulnerable to SQL Injection and having SQLite database. For SQLite database, SQL Injection payloads are different so it is f…☆160Dec 9, 2021Updated 4 years ago
- Proof of Concept example of Android Malware used for Research Purposes☆23Dec 22, 2016Updated 9 years ago
- Engine for collecting onion domains and crawling from webpage based on Tor network☆14Dec 8, 2022Updated 3 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Dec 1, 2016Updated 9 years ago
- A simple python packet sniffer and manipulation tool for linux☆18Nov 26, 2015Updated 10 years ago
- Volatility plugin to extract FileVault 2 VMK's☆51Sep 20, 2021Updated 4 years ago
- "64비트 멀티코어 OS 원리와 구조" 스터디 자료☆114Apr 25, 2016Updated 9 years ago
- Automatic Compartments for Embedded Systems☆24Mar 6, 2020Updated 5 years ago
- quals-2014☆21Nov 3, 2014Updated 11 years ago