a Machine Learning powered CSRF attacks finding tool
☆27Mar 8, 2019Updated 6 years ago
Alternatives and similar repositories for mitch
Users that are interested in mitch are comparing it to the libraries listed below
Sorting:
- A plugin that integrate MOSS and JPlag to Moodle and provide other useful features☆11May 23, 2019Updated 6 years ago
- ☆11Jun 5, 2015Updated 10 years ago
- ☆11Jul 18, 2022Updated 3 years ago
- NextB的基于敏感哈希的恶意文件相似度比较工具(python版本)☆13Jan 20, 2022Updated 4 years ago
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆59Nov 4, 2025Updated 3 months ago
- This novel black-box web vulnerability scanner attempts to infer the state machine of the web application.☆19Mar 12, 2020Updated 5 years ago
- ☆19Feb 1, 2016Updated 10 years ago
- STMCTF17 Writeups☆36Nov 8, 2017Updated 8 years ago
- A Simple command line tool that helps checking web applications to identify insecure deserialization vulnerabilities.☆24Jul 10, 2019Updated 6 years ago
- Library for preprocessing java source code into Augmented ASTs, as per the paper Open Vocabulary Learning on Source Code with a Graph-Str…☆21Oct 22, 2018Updated 7 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆32Dec 20, 2018Updated 7 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆34Jan 9, 2023Updated 3 years ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆35Oct 23, 2017Updated 8 years ago
- Source-binary patch presence test system.☆27Mar 21, 2020Updated 5 years ago
- FoRTE-Research's fuzzing benchmarks☆57Mar 12, 2019Updated 6 years ago
- Triton based R2 plugin for concolic execution and total control☆33Nov 26, 2018Updated 7 years ago
- this repo contains required files for web application pentests☆191Dec 8, 2016Updated 9 years ago
- A fuzzy parser for C/C++ that creates semantic code property graphs☆37Oct 15, 2020Updated 5 years ago
- Serialize/deserialize Range in HTML.☆15Jan 30, 2026Updated last month
- ☆13Dec 16, 2022Updated 3 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Jan 20, 2017Updated 9 years ago
- 哔哩哔哩(https://www.bilibili.com )读取楼层,发送评论,抢楼,抢沙发☆11Apr 16, 2018Updated 7 years ago
- Tools to work with the pwnedkeys.com API☆10Dec 20, 2018Updated 7 years ago
- PEVuln: A Benchmark Dataset for Using Machine Learning to Detect Vulnerabilities in PE Malware☆14Nov 26, 2025Updated 3 months ago
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Jul 25, 2016Updated 9 years ago
- 基于Flink实现实时冰蝎(Behinder)流量检测☆39Sep 30, 2019Updated 6 years ago
- Code repository for experiments in SpecROP paper☆13Sep 3, 2021Updated 4 years ago
- This is a mirror of the main Bitbucket repository. Issue tracking is done on Bitbucket☆12Jun 29, 2022Updated 3 years ago
- Implementation of DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps☆41Apr 13, 2022Updated 3 years ago
- htop for Windows . TUI system monitor with per-core CPU bars, memory/swap/network, tree view, process kill, 7 color schemes, mouse suppor…☆40Updated this week
- A library for adversarial classifier evasion☆43Dec 4, 2014Updated 11 years ago
- ☆41May 23, 2017Updated 8 years ago
- Open source code for MobiPurpose project☆13Mar 25, 2025Updated 11 months ago
- Inferring Strange Behavior from Connectivity Pattern (PAKDD 2014, KAIS 2015)☆11Mar 27, 2015Updated 10 years ago
- Telegram Bot that performs checks of the yararules.com ruleset☆13May 13, 2016Updated 9 years ago
- A (Miasm2 + binaryninja) based function divination.☆15Oct 22, 2017Updated 8 years ago
- ☆11Mar 19, 2022Updated 3 years ago
- ☆11Sep 7, 2023Updated 2 years ago
- ☆90Jul 5, 2016Updated 9 years ago