E²VA short for Exploitation Experience with Vulnerable App is a vulnerable app to learn userspace exploitation on Android
☆17Sep 18, 2023Updated 2 years ago
Alternatives and similar repositories for eeva
Users that are interested in eeva are comparing it to the libraries listed below
Sorting:
- Financial Modelling and Computation☆11Nov 19, 2017Updated 8 years ago
- An application that displays a map and graphs showing solar irradiance forecasts in solar farms in Georgia using data from the National S…☆10Oct 15, 2021Updated 4 years ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- Cloud SQL Proxy works with encrypted credential file.☆10Jan 27, 2021Updated 5 years ago
- Indian agricultural analysis☆11Nov 20, 2018Updated 7 years ago
- Writeup and exploit for CVE-2023-45777, bypass for Intent validation inside AccountManagerService on Android 13 despite "Lazy Bundle" mit…☆100Jan 21, 2024Updated 2 years ago
- ☆12Jan 22, 2026Updated last month
- [Tensorflow] A Game Theoretic approach using GAN for Phishing URL synthesis and detection☆11Nov 14, 2022Updated 3 years ago
- DeepMBTI is an AI-powered MBTI full-stack predictor application. The app includes an interactive front-end that links to an NLP Log Reg M…☆11Nov 5, 2023Updated 2 years ago
- Create graphed invoice for Google Cloud Platform. You can see billing amount per GCP project.☆11Feb 28, 2022Updated 4 years ago
- Matrisea is a web-based Android reversing platform that provides high-fidelity virtual devices with powerful integrated tools☆10Mar 1, 2023Updated 3 years ago
- ☆12Jul 2, 2023Updated 2 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14Jan 9, 2019Updated 7 years ago
- ☆12Feb 16, 2024Updated 2 years ago
- playIntegrityFixDetector is a native app designed to detect modifications, bypasses, or "fixes" applied to the Google Play Integrity API.☆25Jan 27, 2026Updated last month
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Dec 1, 2023Updated 2 years ago
- This app helps the farmers to convert from a food crop to a commercial crop by providing a full fledged cost and risk analysis.☆10Nov 4, 2018Updated 7 years ago
- Slides of mine.☆12Apr 19, 2024Updated last year
- https://5ec1cff.github.io/my-blog/☆15Mar 2, 2026Updated last week
- Network forensics tool to parse pcap and provide visualizations using D3.js☆15Aug 19, 2013Updated 12 years ago
- Collection of exploits that were verified by an automated system☆13Jun 17, 2021Updated 4 years ago
- Phishing Detection System using Natural Language Processing and Machine Learning☆11Jul 28, 2022Updated 3 years ago
- ☆12Feb 13, 2023Updated 3 years ago
- Web application for companies to manage their vehicle fleets☆14Updated this week
- Cyberex Secure is planned to be a security solution with a wide range of features such as phishing detection, advanced AI- face recognit…☆12Apr 5, 2023Updated 2 years ago
- Source Code for 'IoT Machine Learning Applications in Telecom, Energy, and Agriculture' by Puneet Mathur☆13May 11, 2020Updated 5 years ago
- ☆12Dec 26, 2017Updated 8 years ago
- kdf password strengthener☆10Dec 26, 2019Updated 6 years ago
- A Flask Based Web Application which is used to detect the phishing URL's.☆11Nov 27, 2019Updated 6 years ago
- Tool to perform differential fault analysis attack (DFA) on whiteboxes with external encodings.☆16Feb 10, 2023Updated 3 years ago
- A Terraform module for scheduling Vertex Pipeline runs using Google Cloud Scheduler☆13Dec 7, 2022Updated 3 years ago
- This development is designed to measure the content of harmful gases and dust particles using an unmanned aerial vehicle DJI.☆12Jun 28, 2018Updated 7 years ago
- Data Science and Political Campaigns Course at Yale☆14Nov 6, 2025Updated 4 months ago
- ☆13Nov 9, 2022Updated 3 years ago
- ☆14Dec 28, 2020Updated 5 years ago
- Developing a real-life use case implementing AI for plants diseases in smart agriculture in localized context and leveraging open-source …☆14Dec 18, 2023Updated 2 years ago
- Guidelines on writing effective Google Cloud samples.☆13Dec 8, 2025Updated 3 months ago
- Build URL of GCP Cloud Logging Logs Explorer☆16Jul 4, 2024Updated last year