aschubauer / SiderealAstroPy
Astrology calculations with dual-zodiac (tropical and Hindu-Lahiri sidereal) options
☆12Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for SiderealAstroPy
- Repository contains shellcodes made from scratch for intel x86-64 bit Architecture☆12Updated last year
- Advanced Infrastructure Penetration Testing, published by Packt☆27Updated last year
- Fuzzing Framework☆10Updated 7 years ago
- Economics of Ransomware | Dataset☆16Updated 6 years ago
- agent.btz download MALWARE BINARY PROVIDED + POC video☆15Updated 3 years ago
- Additional material for the malware variants identification paper☆9Updated 5 years ago
- Vagrant setup for building a machine for CTF/exploit development☆23Updated 5 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆29Updated 2 years ago
- Data and code for malware classification using machine learning (for fun, not production)☆39Updated 4 years ago
- A Course on Advanced Level Linux Exploitation☆10Updated 6 years ago
- Network based steganography based control channels and chat.☆8Updated 8 years ago
- ☆13Updated 4 years ago
- Tool to create and test shellcodes from custom assembly sources (with some encoding options)☆35Updated 6 years ago
- Learning-Pentesting-With-Python☆20Updated 6 years ago
- Read more: https://www.nu11secur1ty.com/search?q=Kernel video: https://www.nu11secur1ty.com/2017/04/l1nur00tk1tw1ngcun-26x3x4x-zero-days.…☆34Updated last year
- Various shell code I have written☆16Updated 4 years ago
- ☆22Updated 3 years ago
- Sources Codes of many Office Malwares☆16Updated 2 years ago
- ☆11Updated 5 years ago
- CryptoWall 3.0 Ransomware Reversing Documentation & Scripts☆17Updated 3 years ago
- Basic file metadata gathering script☆21Updated 2 years ago
- Writeup from Google Capture The Flag 2018 competition☆9Updated 6 years ago
- Linux Rootkits (4.x Kernel)☆83Updated 3 years ago
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆12Updated 3 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 6 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆48Updated 5 years ago
- Will try to put here slides from now on when I give a talk☆23Updated 3 years ago
- Files for the course Offensive Computer Security 2014 (FSU)☆12Updated 9 years ago