☆30Feb 9, 2022Updated 4 years ago
Alternatives and similar repositories for VisualPhishNet
Users that are interested in VisualPhishNet are comparing it to the libraries listed below
Sorting:
- Python bindings for libsrcml☆17Aug 25, 2025Updated 6 months ago
- Ransomware dataset, containing dynamic behaviour of more than 60 distinct ransomware families.☆10Aug 29, 2022Updated 3 years ago
- Curso realizado por Ricardo Narvaja de CrackLatinos (Mirror) http://ricardonarvaja.info☆12May 28, 2018Updated 7 years ago
- ☆11Jul 20, 2021Updated 4 years ago
- GUI Tool to Generate Android Payloads.☆10May 20, 2020Updated 5 years ago
- ☆14Dec 2, 2021Updated 4 years ago
- ☆14Aug 21, 2020Updated 5 years ago
- ☆10Aug 14, 2019Updated 6 years ago
- Stuff related to scraping the Code Review StackExchange☆12Jan 19, 2023Updated 3 years ago
- Template to detect some malware☆14Aug 7, 2023Updated 2 years ago
- The .NET equivalent of Window's rundll.exe/rundll32.exe☆11Oct 24, 2020Updated 5 years ago
- 早期的计算机使用7位的ASCII编码,为了处理汉字,程序员设计了用于简体中文的GB2312和用于繁体中文的big5。 GB2312(1980年)一共收录了7445个字符,包括6763个汉字和682个其它符号。汉字区的内码范围高字节从B0-F7,低字节从A1-FE,占用的码…☆10Sep 10, 2017Updated 8 years ago
- A curative list of app ideas that you can implement using the Large Language Models.☆12Oct 18, 2023Updated 2 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- A Collection of all things Security☆11Sep 24, 2020Updated 5 years ago
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- ☆10Feb 8, 2021Updated 5 years ago
- This repository accompanies the research paper "P. Kreutzer, S. Kraus, M. Philippsen: Language-Agnostic Generation of Compilable Test Pro…☆12Jul 8, 2022Updated 3 years ago
- Threat intelligence or Cyber Threat Intelligence is the process of identifying and analyzing gathered information about past, current, an…☆13Feb 18, 2024Updated 2 years ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14May 31, 2020Updated 5 years ago
- ROS2 package for the Arctos arm☆16Oct 3, 2025Updated 5 months ago
- Scraped reviews from OpenRice for sentiment analysis. Formatted to use with BERT.☆11Apr 9, 2020Updated 5 years ago
- 🐍 Python Exploit for CVE-2022-0739☆11Dec 9, 2022Updated 3 years ago
- Two plugins to recover TMP keys from Saleae logic analyser traces☆15Jun 10, 2022Updated 3 years ago
- ☆14Jul 18, 2019Updated 6 years ago
- ☆10May 5, 2021Updated 4 years ago
- A PoC that uses the DirSync protocol to poll Active Directory for changes☆13Aug 16, 2020Updated 5 years ago
- Artifact repository for the paper "Perfect Is the Enemy of Test Oracle", In Proceedings of The 30th ACM Joint European Software Engineeri…☆11May 4, 2023Updated 2 years ago
- Ying Zhang, Ya Xiao, Md Mahir Asef Kabir, Daphne Yao, Na Meng. Example-Based Vulnerability Detection and Repair in Java Code 30th IEEE/AC…☆10Jul 31, 2022Updated 3 years ago
- Pre-computed IDF stats over all EN Wiki articles☆12Jan 30, 2020Updated 6 years ago
- Replication package of the ICSE2025 paper titled "Leveraging Large Language Models for Enhancing the Understandability of Generated Unit …☆11Feb 19, 2025Updated last year
- A collection of scripts based on libclang for extracting API information from interpreters☆25Jul 10, 2012Updated 13 years ago
- ☆11Nov 21, 2024Updated last year
- “达观杯”长文本智能处理挑战赛。达观数据提供了一批长文本数据和分类信息,希望选手动用自己的智慧,结合当下最先进的NLP和人工智能技术,深入分析文本内在结构和语义信息,构建文本分类模型,实现精准分类。☆10Jul 20, 2018Updated 7 years ago
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 3 years ago
- certstream + analytics☆11Jan 17, 2020Updated 6 years ago
- ☆13Aug 31, 2024Updated last year
- Cyber Kill Chain is a model that Lockheed Martin created for understanding (Describe the sequence of events) and stopping cyberattacks☆11Jan 29, 2024Updated 2 years ago
- Automatic DLL comment link generation and explaination of the DLL Proxying techniques☆10Aug 19, 2021Updated 4 years ago