Set of Python programming challenge for cyber security (offensive / defensive)
☆52May 7, 2023Updated 2 years ago
Alternatives and similar repositories for pythonidae-challenge
Users that are interested in pythonidae-challenge are comparing it to the libraries listed below
Sorting:
- Flattens photoed pages so they appear like scanned☆20Feb 15, 2024Updated 2 years ago
- Tutorial Dasar Codeigniter☆13Oct 3, 2019Updated 6 years ago
- Ungraded practice exercises for python scripting for security course.☆12Jun 22, 2025Updated 8 months ago
- PoC exploit for the vulnerable (eb.sys or UnknownKiller.sys) – weaponized to kill protected EDR/AV processes via BYOVD.☆55Feb 27, 2026Updated last week
- GigaDrop allows you to easily and securely share files directly between devices without uploading them to any server first☆11Sep 4, 2022Updated 3 years ago
- protect a view source, since f12 and right click can be disabled, so for protecting viewsource this is the way (mandalorian) haha☆26Dec 10, 2021Updated 4 years ago
- Archived, please visit https://github.com/state-alchemists/zrb☆64Dec 17, 2023Updated 2 years ago
- Daftar daerah-daerah di Indonesia lengkap sampai kota kecamatan dalam format JSON☆35Jun 22, 2022Updated 3 years ago
- Proyek latihan yang digunakan di kelas Belajar Dasar Pemrograman Web☆12Aug 23, 2023Updated 2 years ago
- ☆11Jun 19, 2025Updated 8 months ago
- Run TFLITE models on the web☆12Jan 2, 2022Updated 4 years ago
- A very basic app written in Javascript and packaged as a Docker image to be used as a demo when testing clustered deployments in ECS/EKS.☆11Jun 30, 2023Updated 2 years ago
- Sample queries for Advanced hunting in Windows Defender ATP☆11Apr 22, 2020Updated 5 years ago
- QRadar AQL backend for converting Sigma rules to QRadar AQL queries☆14Sep 18, 2025Updated 5 months ago
- Contoh aplikasi realtime chat dengan pusher☆37Dec 26, 2020Updated 5 years ago
- Simple Javanese Macapat Generator using Markovify (Markov-Chain rules)☆10Feb 12, 2026Updated 3 weeks ago
- 🔍 Modern and user-friendly UI app that allows users to scrape comments from YouTube videos, extract and export in TXT, CSV, or JSON. Ide…☆13Oct 27, 2025Updated 4 months ago
- Visual-based analysis of file system metadata. The tool enables digital forensics of large volumes of data.☆10May 10, 2024Updated last year
- Application managemen menu, user (CMS for Simple WEB)☆12Jul 1, 2021Updated 4 years ago
- In this article i've listed a collection of cheatsheets for digital forensics. It covering forensics topics for smartphone , memory , net…☆13Mar 8, 2020Updated 6 years ago
- A collection of powershell scripts that are designed to be ran from a Microsoft Defender for Endpoint Live Response terminal, utilizing o…☆12Apr 26, 2023Updated 2 years ago
- Knock your images before you get stressed.☆11Jan 9, 2022Updated 4 years ago
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆18Mar 22, 2020Updated 5 years ago
- a curated list of "basic" knowledge that "good to know" by evilfactorylabs members. But feel free to take a look and learn together!☆152Apr 14, 2025Updated 10 months ago
- Integrating Event-based Dynamic Vision Sensors with Sparse Hyperdimensional Computing☆12Jul 9, 2020Updated 5 years ago
- Simple python3 script to automate CVE-2018-9995☆11Feb 20, 2024Updated 2 years ago
- ☆12Jan 28, 2025Updated last year
- Face2Faceの実装とか☆13Jun 11, 2016Updated 9 years ago
- Elasticsearch tutorial notes☆12Nov 13, 2020Updated 5 years ago
- Legacy version of libewf☆13Dec 20, 2025Updated 2 months ago
- Pixano website☆10Apr 7, 2022Updated 3 years ago
- Drag and drop Image file uploading demo in Nuxt3☆10Jan 30, 2025Updated last year
- analisis hidrologi menggunakan python☆10Apr 18, 2024Updated last year
- Aurelia pseudo hashing method is experimental method to hash a password using HMAC, PBKDF2 and Pseudo random.☆13May 3, 2018Updated 7 years ago
- MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office doc…☆19Mar 20, 2025Updated 11 months ago
- My Linux profiles built for Volatility 2/3☆10Oct 11, 2025Updated 4 months ago
- Production-ready Chainlit RAG application with Pinecone pipeline offering all Groq and OpenAI Models, to chat with your documents.☆11Aug 19, 2025Updated 6 months ago
- A pipeline framework for data science projects☆10Aug 9, 2022Updated 3 years ago
- MikroTik RouterOS API client for node.js.☆11Aug 22, 2019Updated 6 years ago