Make datasets like FFRI Dataset
☆13Jul 23, 2024Updated last year
Alternatives and similar repositories for ffridataset-scripts
Users that are interested in ffridataset-scripts are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Compilation of peHash implementations.☆14May 2, 2019Updated 6 years ago
- Yet another implementation of PEiD with yara☆17Jan 6, 2017Updated 9 years ago
- ☆14Aug 24, 2020Updated 5 years ago
- This is a sample approach of data analysis in security scene.☆18Oct 21, 2018Updated 7 years ago
- Ptcoresec jeopardy style scoreboard☆23Jul 17, 2012Updated 13 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- [AdvML@KDD 2019] Robust Malware Detection Challenge☆18Nov 28, 2019Updated 6 years ago
- Automatically identify and extract potential anti-debugging techniques used by malware.☆28Nov 20, 2024Updated last year
- Training Materials of Practical Reverse Engineering using Radare2☆107Feb 18, 2017Updated 9 years ago
- RISC-V Soft CPU Security Contest by Thales and Microchip Technology☆12Jul 29, 2019Updated 6 years ago
- ☆16Jan 5, 2017Updated 9 years ago
- Parallel ssdeep clustering kit☆20Dec 24, 2017Updated 8 years ago
- Wrapper for TSK (Sleuth Kit) Bindings☆12Jan 10, 2023Updated 3 years ago
- Check Sigma rules for easy-to-bypass whitelists to make them more robust (https://github.com/SigmaHQ/sigma)☆15Feb 1, 2021Updated 5 years ago
- ☆13Aug 26, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆13Jun 19, 2018Updated 7 years ago
- Helper scripts to automate the extraction of YARA rules from XProtectRemediators☆22Mar 5, 2024Updated 2 years ago
- Parsing MITRE EDR Evaluation results☆12Dec 5, 2018Updated 7 years ago
- Tools once available from McAfee but are no longer☆13May 9, 2024Updated last year
- Python scripts for using mindmup JSON as a medium for developing attack trees☆15Aug 25, 2021Updated 4 years ago
- One-Click to Completely Take Over A macOS Device☆18Aug 25, 2022Updated 3 years ago
- ☆14Dec 10, 2021Updated 4 years ago
- MCP Server for Cutter☆23Aug 2, 2025Updated 8 months ago
- ☆10Jul 8, 2020Updated 5 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- InSpec profile to validate the secure configuration of Red Hat Enterprise Linux 7, against DISA's Red Hat Enterprise Linux 7 Security Tec…☆15Dec 15, 2025Updated 3 months ago
- USER-MESO package for LAMMPS☆13Oct 9, 2016Updated 9 years ago
- ☆19Dec 28, 2021Updated 4 years ago
- An efficient tool for extracting files, directories, and alternate data streams directly from NTFS image files.☆22Mar 30, 2026Updated last week
- The answers for the exercises of APUE(Advanced Programming in the Unix Environment)☆11Jun 30, 2017Updated 8 years ago
- Some learning materials, notes and scripts about the programming and security of microcontroller.☆15Mar 15, 2022Updated 4 years ago
- GHARF is an efficient support framework for Red Team exercises that applies the concept of CI/CD☆38Jul 14, 2025Updated 8 months ago
- r2con 2017 September 6-9☆97Oct 23, 2017Updated 8 years ago
- C++ implementation of ssdeep-compatible fast fuzzy hashing☆38Jun 28, 2017Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Jul 27, 2022Updated 3 years ago
- M5Stack-core2を使ったポケッチ風アプリケーション☆14Nov 22, 2021Updated 4 years ago
- Ghidra analyzer for UEFI firmware.☆18Jun 24, 2023Updated 2 years ago
- Elastic Malware Benchmark for Empowering Researchers☆1,141Nov 22, 2024Updated last year
- ☆53Jun 13, 2019Updated 6 years ago
- Library for structured fuzzing of ASN.1 DER/BER☆19Sep 6, 2022Updated 3 years ago
- Fuzzy Hash calculated from import API of PE files☆90Aug 26, 2022Updated 3 years ago