This is a repository for the LinkedIn Learning course Virtualization with KVM and Qemu
☆19Jan 23, 2023Updated 3 years ago
Alternatives and similar repositories for virtualization-with-kvm-and-qemu-2487226
Users that are interested in virtualization-with-kvm-and-qemu-2487226 are comparing it to the libraries listed below
Sorting:
- Resilient Virtual Machine Monitor is a complete fault tolerance solution for type-I hypervisors adopting one of the most popular VMM arch…☆11Jul 30, 2020Updated 5 years ago
- A bunch of lua dissectors for Wireshark that support iNet-X and IENA packet formats☆16Jan 28, 2026Updated last month
- ☆11Jun 2, 2016Updated 9 years ago
- Sigma rules converted for direct use with Zircolite☆14Updated this week
- for Telegram image save on server☆14Apr 19, 2023Updated 2 years ago
- ☆20Aug 20, 2025Updated 6 months ago
- Open KLara Project☆36Feb 12, 2026Updated 3 weeks ago
- API per le carte HYPE e TIM Pay☆16Feb 16, 2021Updated 5 years ago
- Docker container with all extra tools installed to get the most out of binwalk☆20Dec 17, 2020Updated 5 years ago
- Assessing 📊 the impact of class imbalance on model performance and convergence for malware byteplot image 🌌 classification☆16Oct 9, 2023Updated 2 years ago
- Epimitheus is a tool that uses graphical database Neo4j for Windows Events visualization.☆19Mar 13, 2022Updated 3 years ago
- An Extensible Dynamic Analysis Framework for IoT Devices☆21Aug 9, 2018Updated 7 years ago
- Sth in Control-Flow Integrity☆19Dec 25, 2018Updated 7 years ago
- Scarica il file e mandami un writeup se riesci a risolvere la CTF :)☆23Jul 9, 2023Updated 2 years ago
- CAPE Auto-Hardened Installer☆26Jan 28, 2026Updated last month
- EVIL (Exploiting software VIa natural Language) is an approach to automatically generate software exploits in assembly/Python language fr…☆29Mar 8, 2022Updated 4 years ago
- 腾讯安全智能渗透挑战赛获奖团队答辩材料及项目列表☆80Updated this week
- ☆27May 27, 2020Updated 5 years ago
- This repository contains experiments for different publications at the intersection of Computer Vision and Computer Security.☆29Feb 22, 2024Updated 2 years ago
- ☆26Apr 18, 2019Updated 6 years ago
- Simple Powershell scripts to collect all Windows Event Logs from a host and parse them into one CSV timeline.☆32Oct 13, 2018Updated 7 years ago
- Remote access and Antivirus Logging Database☆45Apr 28, 2024Updated last year
- A collection of useful PowerShell tools to collect, organize, and visualize Sysmon event data☆39Mar 23, 2020Updated 5 years ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆41Aug 9, 2023Updated 2 years ago
- The parser-directed Fuzzer☆40May 22, 2020Updated 5 years ago
- For our ISSTA23 paper "How Effective are Neural Networks for Fixing Security Vulnerabilities?" by Yi Wu, Nan Jiang, Hung Viet Pham, Thiba…☆41Nov 13, 2023Updated 2 years ago
- A list of resources (papers, books, talks, frameworks, tools) for understanding fuzzing for IoT/embedded devices.☆52Jul 5, 2022Updated 3 years ago
- An Incident Response tool that visualizes historic process execution evidence (based on Event ID 4688 - Process Creation Event) in a tree…☆60Jan 30, 2018Updated 8 years ago
- Replication package for the paper "Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study" published at the I…☆58Aug 29, 2022Updated 3 years ago
- Decrypt TP-Link Firmware☆73Oct 5, 2025Updated 5 months ago
- Hands on lab materials for the PowerShell Security session☆47Aug 29, 2019Updated 6 years ago
- Modbus Dataset from CSET 2016☆49Mar 31, 2023Updated 2 years ago
- A curated dataset of malware and benign Windows executable samples for malware researchers☆52Feb 17, 2026Updated 2 weeks ago
- Transfer Learning for Image-Based Malware Classification☆47Mar 1, 2022Updated 4 years ago
- qemu vulnerablity.☆55May 25, 2021Updated 4 years ago
- This is the repository for paper "An Empirical Study on ARM Disassembly Tools" accepted to ISSTA 2020☆65Aug 22, 2023Updated 2 years ago
- ☆55Mar 9, 2022Updated 4 years ago
- ☆72Nov 1, 2023Updated 2 years ago
- Phishing dataset with more than 88,000 instances and 111 features. Web application available at. https://gregavrbancic.github.io/Phishing…☆69Mar 20, 2023Updated 2 years ago