☆21Mar 2, 2024Updated 2 years ago
Alternatives and similar repositories for DongTing
Users that are interested in DongTing are comparing it to the libraries listed below
Sorting:
- Code for labeling malicious powershell events in the fiveeyes Darpa OPTC dataset☆12Jun 22, 2023Updated 2 years ago
- ☆17Sep 26, 2022Updated 3 years ago
- ☆11Jul 28, 2024Updated last year
- Detection of rootkit file hiding activities through analysis of shifts in kernel function execution times.☆29Sep 10, 2025Updated 6 months ago
- ☆13Jul 11, 2024Updated last year
- A bunch of reverse engineering Binaries dedicated to practice.☆17Feb 14, 2026Updated last month
- An IDA plugin that uses language models to speed up binary analysis.☆45Nov 23, 2025Updated 3 months ago
- Set of useful scrpts☆10Jan 4, 2015Updated 11 years ago
- 「⚔️」Ring 0 Rootkit for Linux Kernels x86/x86_64 5.x/6.x☆26Apr 10, 2025Updated 11 months ago
- Parallel Quantum Annealing☆10Jan 7, 2023Updated 3 years ago
- ☆11Oct 7, 2023Updated 2 years ago
- Synthesized speech recognition☆38Jun 9, 2025Updated 9 months ago
- Rust implementation of the Process Herpaderping☆26Jul 6, 2023Updated 2 years ago
- ☆18Apr 21, 2025Updated 11 months ago
- State of vulnerabilties report☆11Feb 20, 2020Updated 6 years ago
- poc or exp of some famous vulnerability☆14Mar 5, 2014Updated 12 years ago
- Dataset from Linux Raspian VMs and devices with auditd logs capturing various container escape and attacks.☆15Jul 30, 2022Updated 3 years ago
- ☆12Jul 18, 2024Updated last year
- Setup private key and add host to known hosts☆36Nov 15, 2025Updated 4 months ago
- Implementation of FedDR algorithm for federated learning.☆11Mar 8, 2022Updated 4 years ago
- Unsupervised coverage-guided btrfs fuzzer☆15Nov 13, 2020Updated 5 years ago
- HTTP requests of FrontPage expolit☆25Dec 19, 2013Updated 12 years ago
- sqlmap tamper script for unicode escape inside json☆14Dec 20, 2018Updated 7 years ago
- Code of Truman: Constructing Device Behavior Models from OS Drivers to Fuzz Virtual Devices (NDSS 2025)☆24Apr 11, 2025Updated 11 months ago
- Poise source code repo☆12Aug 12, 2020Updated 5 years ago
- [ASE'24] SoVAR: Build Generalizable Scenarios from Accident Reports for Autonomous Driving Testing☆20Mar 29, 2025Updated 11 months ago
- Analysis of syscall sequence pattern from exploit codes for advanced system call sequence filtering for enhanced container security☆16May 21, 2023Updated 2 years ago
- An Antlr4 Grammar for OPENQASM 2.0☆17Feb 21, 2018Updated 8 years ago
- ☆19Feb 22, 2024Updated 2 years ago
- a labelled version of the ADFA-LD dataset for HIDS evaluation☆50Aug 2, 2019Updated 6 years ago
- Log4j2 CVE-2021-44228 revshell, ofc it suck!!☆18Dec 21, 2021Updated 4 years ago
- Examples of using DWave quantum annealing system☆15Apr 28, 2022Updated 3 years ago
- TensorFlow Developer Certification Prep Work☆26Feb 10, 2022Updated 4 years ago
- Files from Zeronights presentation.☆28Nov 23, 2012Updated 13 years ago
- Automate generation of syzkaller's grammar☆16Nov 1, 2022Updated 3 years ago
- This repository contains dynamic and static tools for IoT malware analysis☆21Jul 4, 2022Updated 3 years ago
- LID-DS is an intrusion detection data simulation framework.☆55May 15, 2025Updated 10 months ago
- CVE & others☆19Aug 14, 2018Updated 7 years ago
- Repository for LabRAD tutorials and resources sharing.☆20Jul 8, 2015Updated 10 years ago