Investigation of Android mobile Malware using the SherLock dataset
☆14Jun 29, 2017Updated 8 years ago
Alternatives and similar repositories for Android_Malware_Capstone
Users that are interested in Android_Malware_Capstone are comparing it to the libraries listed below
Sorting:
- KronoDroid Dataset☆36Nov 7, 2025Updated 4 months ago
- An ANN-LSTM based Model for Learning Individual Customer Behavior in Response to Electricity Prices☆11Mar 27, 2020Updated 5 years ago
- Teknolojide İstihdam Projesi kapsamında verdiğim uygulamalı doğal dil işleme dersinin kod ve sunumlarını burada barındıracağım.☆14Jun 2, 2023Updated 2 years ago
- Web interface to IntelMQ☆10Sep 10, 2025Updated 5 months ago
- Power Plant ML Pipeline Application - Apache Spark☆12Dec 12, 2016Updated 9 years ago
- Import Nmap scans to Cherrytree☆36Jul 4, 2022Updated 3 years ago
- Classifying products into product categories with the fastText machine learning library. (Python)☆12Sep 5, 2020Updated 5 years ago
- Universal Forensic Indexer and Analyzer☆10Jan 8, 2017Updated 9 years ago
- A Burp Suite extension implementing the Signing HTTP Messages draft-ietf-httpbis-message-signatures-01 draft.☆41Aug 16, 2022Updated 3 years ago
- Windfarm Open Data Analysis: “La Haute Borne” (Meuse, France)☆13Nov 12, 2018Updated 7 years ago
- Prediction of wind turbine power generation from real-time SCADA data☆15May 22, 2022Updated 3 years ago
- A thread dump analyzer tool running on your browser or in your JVM that generates DOT documents out of `jstack` outputs.☆10Jul 10, 2024Updated last year
- Offensive tool for guessing Active Directory credentials via Kerberos☆10Jan 1, 2024Updated 2 years ago
- ☆11Mar 19, 2019Updated 6 years ago
- Scan IPv4 prefixes for DNS revolvers and classify them as open/closed☆10Jun 19, 2014Updated 11 years ago
- fanotify cron system☆21Sep 15, 2015Updated 10 years ago
- A serverless application for processing AWS GuardDuty findings.☆11Sep 7, 2018Updated 7 years ago
- Malware Analysis and Storage System - Server repository☆12Jul 15, 2022Updated 3 years ago
- Une application Android qui utilise l'API du site Tariki.dz☆10Aug 27, 2016Updated 9 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- Sample code for ret2usr (and ret2dir) kernel attacks☆10Nov 23, 2016Updated 9 years ago
- PPT of my talks.☆13Jun 23, 2025Updated 8 months ago
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- ☆13Aug 28, 2018Updated 7 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆10Sep 11, 2020Updated 5 years ago
- Container security resources☆10Nov 14, 2020Updated 5 years ago
- Algerian Wilayas list in different formats (XML, JSON, xsl..etc) for the sake of DRY☆14May 20, 2014Updated 11 years ago
- Ktor plugins repository☆10Jan 14, 2023Updated 3 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago
- SoC-independent part of the iso7816 stack☆13Feb 28, 2024Updated 2 years ago
- ☆12Jan 17, 2024Updated 2 years ago
- Pentest report writing guide☆18Sep 24, 2023Updated 2 years ago
- A fast, powerful, flexible and easy to use open source data analysis and manipulation tool written in Rust☆14Dec 31, 2023Updated 2 years ago
- Sys Mon! Why yu nuh logging dat?☆12Dec 10, 2018Updated 7 years ago
- Implementing Machine Learning tasks using Tensorflow framework☆16Feb 2, 2018Updated 8 years ago
- A collection of pen-testing/hacking scripts. Various uses.☆13Oct 24, 2020Updated 5 years ago
- DFF (Digital Forensics Framework)☆11Jan 6, 2021Updated 5 years ago
- WiP - cve-search next gen☆13Jan 18, 2020Updated 6 years ago