Workshops organized to introduce students to security, AI, blockchain, AR/VR, hardware and software
☆386Dec 18, 2025Updated 2 months ago
Alternatives and similar repositories for Workshops
Users that are interested in Workshops are comparing it to the libraries listed below
Sorting:
- With underflow, create trafic light clusters that interact together to regulate circulation☆13Mar 13, 2020Updated 5 years ago
- Link Epitech calendar to google calendar☆45Mar 8, 2024Updated last year
- An autonomous car able to ride safely.☆13Jan 31, 2021Updated 5 years ago
- ☆23Dec 2, 2021Updated 4 years ago
- A curated list of awesome Epitech related stuff.☆19Jan 6, 2026Updated last month
- A collection of tools to manage asynchronous tasks in crystal☆11May 10, 2019Updated 6 years ago
- PCB layout for my cheap FPGA HDMI experimenting board☆10Aug 21, 2014Updated 11 years ago
- Mobile phone PWN tools and scripts☆15Sep 20, 2020Updated 5 years ago
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- A collection of PeachPits for Peach Fuzzer to support EAP, 802.1x, and RADIUS Fuzzing☆17Dec 29, 2015Updated 10 years ago
- A collection of tools adversaries commonly use in an attack.☆14Nov 23, 2024Updated last year
- CryptoWall 3.0 Ransomware Reversing Documentation & Scripts☆17Nov 24, 2020Updated 5 years ago
- Generic plugin based web application security fuzzing for anomalies by Slándáil Research Limited☆13Feb 13, 2024Updated 2 years ago
- The Hall of Ancient Exploitation Tools☆16Oct 14, 2019Updated 6 years ago
- A Simple VM-based challenge created using the academic tigress obfuscator☆19Jun 30, 2022Updated 3 years ago
- ☆17Nov 12, 2019Updated 6 years ago
- Python emulator for Excel XLM macros.☆18May 25, 2020Updated 5 years ago
- A ton of helpful tools☆15Jul 31, 2016Updated 9 years ago
- Collection of IDA Pro/Hex-Rays configs, scripts, and plugins☆23Mar 20, 2020Updated 5 years ago
- Simple windows backdoor command shell.☆20Dec 4, 2017Updated 8 years ago
- Threat Box Assessment Tool☆19Aug 15, 2021Updated 4 years ago
- Hunt and Analyze Tor Onion Sites☆23Dec 8, 2022Updated 3 years ago
- A shell script to download malware domains from various sources, and configuring unbound DNS config file to be used as a local recursive …☆19Sep 12, 2014Updated 11 years ago
- Low budget VirusTotal Intelligence Cosplay☆20Jan 6, 2022Updated 4 years ago
- Malware similarity platform with modularity in mind.☆80Jul 18, 2021Updated 4 years ago
- Linux crash harness with runtime process instrumentation☆22Nov 7, 2020Updated 5 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Feb 15, 2022Updated 4 years ago
- Command and Control that uses NTP as the transport protocol.☆26Jan 29, 2022Updated 4 years ago
- treafik fronted c2 examples☆25Dec 6, 2020Updated 5 years ago
- OSS-Fuzz Public Corpora Crawler☆30Feb 23, 2023Updated 3 years ago
- ☆24Jun 29, 2021Updated 4 years ago
- Puppeteer based crawler to measure email and password exfiltration☆26Jan 7, 2026Updated last month
- expansion of afl-unicorn using c++☆28Aug 29, 2019Updated 6 years ago
- Basic Auth Phish page☆25Sep 11, 2017Updated 8 years ago
- Binary Ninja plugin that can be used to apply Triton's dead store eliminitation pass on basic blocks or functions.☆64Jul 17, 2024Updated last year
- A community event for security researchers to share their favorite notebooks☆108Feb 15, 2024Updated 2 years ago
- ☆34Jun 13, 2023Updated 2 years ago
- executing JS from x86 code☆27May 9, 2019Updated 6 years ago
- SSRF to TCP Port Scanning, Banner and Private IP Disclosure by abusing the FTP protocol/clients☆70Jul 29, 2021Updated 4 years ago