Malicious PowerShell Dataset
☆24Aug 8, 2023Updated 2 years ago
Alternatives and similar repositories for Malicious-PowerShell-Dataset
Users that are interested in Malicious-PowerShell-Dataset are comparing it to the libraries listed below
Sorting:
- ☆10Jun 29, 2022Updated 3 years ago
- ☆16Sep 10, 2023Updated 2 years ago
- Collection of my dotfiles of divers applications and configs☆12Nov 14, 2025Updated 3 months ago
- writeups for Capture The Flag Competitions☆16May 31, 2022Updated 3 years ago
- In this repository , you find my implementations for some classical cryptography algorithms and their vulnerabilities using python and …☆13Feb 8, 2023Updated 3 years ago
- Extract the opcode from the objdump of a binary☆13Dec 28, 2015Updated 10 years ago
- ☆15Jul 26, 2021Updated 4 years ago
- NapierOne. A Publicly Available Modern Mixed File Data Set. The data set is suitable for a variety of testing scenarios such as Ransomwar…☆22Jan 25, 2022Updated 4 years ago
- Malware datasets tagged by behavior, platform, vulnerability, and packer☆30Mar 15, 2024Updated last year
- RanSAP: An Open Dataset of Ransomware Storage Access Patterns for Training Machine Learning Models☆28Aug 20, 2024Updated last year
- Discord CTF helper bot☆66Jan 20, 2026Updated last month
- Ransomware Dataset for arXiv:1609.03020☆30Dec 29, 2021Updated 4 years ago
- ☆10Dec 30, 2020Updated 5 years ago
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- Implementation of the TFHE homomorphic encryption scheme.☆12May 14, 2021Updated 4 years ago
- PsSetCreateProcessNotifyRoutine/Ex/Ex2 hook☆12May 30, 2024Updated last year
- A Windows kernel driver unit testing framework. Provides a macro free modern cpp syntax. Includes tools for automatic running on your vm.☆11May 15, 2023Updated 2 years ago
- Client/Server framework for encrypted machine learning using homomorphic encryption☆43Oct 1, 2021Updated 4 years ago
- LyraX kde is a light clean theme for KDE Plasma desktop.☆12Jun 6, 2022Updated 3 years ago
- A mitmproxy addon that allows use of the HTTP Toolkit Android app.☆10Jun 25, 2023Updated 2 years ago
- Python tool to parse and decrypt files quarantined by windows defender☆13Feb 25, 2023Updated 3 years ago
- This repository contains a basic custom lab environment designed to demonstrate and explore SQL injection vulnerabilities. The lab provid…☆10Sep 20, 2023Updated 2 years ago
- 使用卷积神经网络识别恶意软件,其特点是把文件的每个字节都当做输入☆16Oct 14, 2024Updated last year
- [ICLR 2025 SCI-FM Workshop] Lemur: Log Parsing with Entropy Sampling and Chain-of-Thought Merging☆13Mar 27, 2025Updated 11 months ago
- a brief example of mqtt usage to send camera stream to web page☆11May 4, 2022Updated 3 years ago
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.☆17Dec 12, 2023Updated 2 years ago
- Source code for 'Software Exorcism' by Bill Blunden☆13Mar 30, 2017Updated 8 years ago
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- A tool for patching/injecting code into elf binaries.☆14Sep 27, 2012Updated 13 years ago
- AES文件加密解密☆10Apr 26, 2023Updated 2 years ago
- A toolkit for CTF challenges☆10Jan 18, 2017Updated 9 years ago
- Detection of malicious data exfiltration over DNS using Machine Learning techniques☆13Jul 8, 2020Updated 5 years ago
- A Guide for Encode Categorical Variables, with implementations and examples in Python.☆11Sep 9, 2020Updated 5 years ago
- Demonstrate the behavior of the tunnel cache on Windows☆11Aug 13, 2019Updated 6 years ago
- Bulk indicator VirusTotal lookups supporting file hashes, domains and IPs.☆12May 28, 2025Updated 9 months ago
- Pop Os dotfiles☆10Mar 18, 2023Updated 2 years ago
- malicious bash scripts☆10Apr 3, 2022Updated 3 years ago
- Official GDG Algiers CTF 2022 Writeups☆39Oct 19, 2022Updated 3 years ago