Введение в анализ данных и машинное обучение
☆29Feb 2, 2018Updated 8 years ago
Alternatives and similar repositories for ml-course-uz
Users that are interested in ml-course-uz are comparing it to the libraries listed below
Sorting:
- A collection of phishing techniques used to evade detection. #nolockdown☆23Aug 28, 2025Updated 6 months ago
- Script for automating Linux memory capture and analysis☆13May 6, 2020Updated 5 years ago
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 4 months ago
- [ARCHIVED -- USE TXT2DETECTION] A command line tool that converts Sigma Rules into STIX 2.1 Objects.☆12Feb 19, 2026Updated 2 weeks ago
- ☆74Nov 28, 2025Updated 3 months ago
- Setting up a Windows Event Collector☆12Aug 7, 2023Updated 2 years ago
- Hobby simple kernel (x86-64) and bootloader (UEFI) written in C++.☆20Sep 23, 2024Updated last year
- An introduction to detection engineering☆14Jan 3, 2025Updated last year
- Portable utility to execute in memory a sequence of opcodes☆18Aug 28, 2016Updated 9 years ago
- A free data collection and YARA scanning tool for cybersecurity incident investigation, compromise assessment and threat hunting☆21Nov 12, 2024Updated last year
- a keylogger for Windows. This is not meant for spying.☆18Jul 25, 2014Updated 11 years ago
- Bitrix vulnerability scanner☆23Mar 28, 2023Updated 2 years ago
- Security Orchestration, Automation and Response for Security Analysts, published by Packt☆23Jan 24, 2025Updated last year
- Malicious shortcut file builder for spear-phishing and red-team engagement.☆17Sep 11, 2023Updated 2 years ago
- A Windows 10 login phishing page for your red team exercises☆15Apr 25, 2021Updated 4 years ago
- A Python port of the JJDecoder function written by Syed Zainudeen☆19Jan 28, 2014Updated 12 years ago
- BasicLDR: A Reflective DLL Loader☆14Jun 11, 2024Updated last year
- Understanding the operation and limitations of Sysmon's events☆23Sep 15, 2022Updated 3 years ago
- Offline AI Security Assistant for Air-Gapped Pentesting☆68Feb 22, 2026Updated 2 weeks ago
- ☆19Nov 27, 2020Updated 5 years ago
- Открытый репозиторий с правилами на языке eXtraction and Processing (XP)☆28Sep 30, 2025Updated 5 months ago
- Ansible role for installing Sysmon with popular config files included.☆24Jan 8, 2023Updated 3 years ago
- lnk_parser is a full rust implementation to parse windows LNK files☆23Feb 17, 2026Updated 2 weeks ago
- MP SIEM SDK☆31Dec 15, 2025Updated 2 months ago
- KeePass 2.X dumper (CVE-2023-32784)☆27Nov 4, 2023Updated 2 years ago
- Client-side Encrypted Upload Server Python Script☆67Jul 10, 2025Updated 8 months ago
- reverse socks tunneler with ntlm and proxy support☆28Nov 24, 2019Updated 6 years ago
- The new name is DeTT&CT☆24Jul 8, 2019Updated 6 years ago
- RCE PoC for Empire C2 framework <5.9.3☆28Feb 24, 2024Updated 2 years ago
- реп полезностей для PT MaxPatrol SIEM☆24Sep 18, 2023Updated 2 years ago
- Clipboard for Command and Control between VDI, RDP and Others on Windows☆50Dec 7, 2025Updated 3 months ago
- Примеры с моего YouTube/Rutube канала☆42Jan 29, 2026Updated last month
- Enterprise Response Model & Common Knowledge☆38Jul 3, 2025Updated 8 months ago
- List with File Extensions used by Ransomware☆37Updated this week
- Volatility Symbol Generator for Linux Kernels☆37Nov 15, 2023Updated 2 years ago
- Volatility, on Docker 🐳☆41Nov 20, 2025Updated 3 months ago
- execute PE in memory Filelessly☆52Feb 8, 2025Updated last year
- Finding secrets in various (non-text) popular files.☆52Oct 21, 2025Updated 4 months ago
- Fully Undetectable telegram Rat dropper☆35Nov 16, 2020Updated 5 years ago