☆12Mar 16, 2026Updated this week
Alternatives and similar repositories for CASE-Examples
Users that are interested in CASE-Examples are comparing it to the libraries listed below
Sorting:
- Cyber-investigation Analysis Standard Expression (CASE) Ontology☆72Sep 23, 2025Updated 5 months ago
- Quick and dirty script to parse bplists with Ruby☆14Oct 29, 2020Updated 5 years ago
- MattockFS Computer Forensics File-System☆12Mar 26, 2018Updated 7 years ago
- This repository is for development of the Unified Cyber Ontology.☆107Mar 13, 2026Updated last week
- Simple kakaotalk chat bot; it uses Golang☆11Dec 19, 2019Updated 6 years ago
- An example C++ repository built with CMake on Linux using GitLab CI and analyzed on SonarQube☆11Updated this week
- This is a simple tool to dump all the reparse points on an NTFS volume.☆33Aug 20, 2020Updated 5 years ago
- This is a read-only mirror of the CRAN R package repository. surveillance — Temporal and Spatio-Temporal Modeling and Monitoring of Epi …☆11Jun 25, 2025Updated 8 months ago
- ☆11Feb 3, 2026Updated last month
- TS3Tunnel is a proof of concept showing how easy it is to spy on the private audio communications of the TeamSpeak 3 users without anyone…☆13Nov 30, 2018Updated 7 years ago
- Register asynchronous callbacks before/after operations; uses include: validation, authorization, notification☆43Jan 21, 2026Updated last month
- ECE 209 Security of Embedded Systems Project☆16Mar 17, 2018Updated 8 years ago
- ☆23Dec 29, 2020Updated 5 years ago
- ☆12May 29, 2018Updated 7 years ago
- Remote Keyless Entry Systems☆18Mar 26, 2017Updated 8 years ago
- ☆14Sep 17, 2024Updated last year
- Association of Computer Enthusiasts brings you with ACECTF. Test your hacking skills in our thrilling 24-hour cybersecurity challenge. Le…☆15Mar 2, 2025Updated last year
- DC3 SQLite Dissect☆72Nov 4, 2024Updated last year
- A Flutter based memory game with ShaderMask and CustomPainter☆14Aug 19, 2022Updated 3 years ago
- A utility to parse and analyze Windows Event Log files for recurrent failure patterns☆19Jun 5, 2025Updated 9 months ago
- Exploiting Software-Defined Radio - Common attacks and a device to exploit them (Proof of Concept).☆17Jan 12, 2021Updated 5 years ago
- Linux Evidence Acquisition Framework☆119Sep 30, 2024Updated last year
- Yet Another AES-Rijndael ASP.NET C# implementation with advanced configuration settings☆10Jul 13, 2018Updated 7 years ago
- A simple CLI tool implementing a low level PUB/SUB system in Golang.☆11Oct 15, 2021Updated 4 years ago
- exFAT reader implementation based on Microsoft specifications.☆20Jun 2, 2024Updated last year
- A go board made with Python and pygame.☆23Mar 4, 2019Updated 7 years ago
- Client API to query the Phishing Initiative service API☆24Jan 8, 2026Updated 2 months ago
- A modified extractor for the CROHME handwritten math symbols dataset.☆21Sep 15, 2017Updated 8 years ago
- HyperLogLog in golang☆26May 22, 2018Updated 7 years ago
- Extracts from the Unix Philosophy 🖥 🗝☆14Feb 24, 2018Updated 8 years ago
- Twitter Toolbox for Python.☆31Dec 12, 2018Updated 7 years ago
- ☆16Apr 19, 2022Updated 3 years ago
- This is an initiative where-in people can ask questions (directly or anonymously) as issues. People can then respond to them as comments.…☆13Sep 14, 2018Updated 7 years ago
- Brute force unlock for an android pin using a STM32F4 Discovery development board.☆28Nov 9, 2013Updated 12 years ago
- Segmentation, classification and parsing of handwritten math expressions. Works with inkml format.☆22Feb 19, 2019Updated 7 years ago
- This is a gym website.☆15Oct 1, 2020Updated 5 years ago
- Ferramenta para criação de payloads HID (human interface device) para android sem nethunter ou rubber ducky☆18Aug 11, 2018Updated 7 years ago
- HID Proximity RFID reader library for Arduino☆26Oct 28, 2024Updated last year
- Python Forensic and Log Analysis GUI☆27Dec 22, 2014Updated 11 years ago