hashmyfiles : Finds md5 and Calculate MD5/SHA1/CRC32 hashes of any file
☆15Oct 3, 2015Updated 10 years ago
Alternatives and similar repositories for hashmyfiles
Users that are interested in hashmyfiles are comparing it to the libraries listed below
Sorting:
- Ransomware Dataset for arXiv:1609.03020☆30Dec 29, 2021Updated 4 years ago
- ☆10Dec 30, 2020Updated 5 years ago
- ☆12Aug 4, 2018Updated 7 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Are WiFi Passwords we use these day's actually safe?☆10Mar 7, 2017Updated 9 years ago
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Jul 19, 2020Updated 5 years ago
- A Guide for Encode Categorical Variables, with implementations and examples in Python.☆11Sep 9, 2020Updated 5 years ago
- PwnWiki - The notes section of the pentesters mind.☆11Nov 16, 2016Updated 9 years ago
- malicious bash scripts☆10Apr 3, 2022Updated 3 years ago
- VS Code syntax support for MySQL☆12Oct 7, 2019Updated 6 years ago
- VB Exe Parser is an IDA script written in Python. This script will help you to parse VB program internal structures. It can find: Event, …☆17Oct 8, 2016Updated 9 years ago
- Umbrella project for the IBMStreams organization. This project will be used for the management of the individual projects within the IBM…☆19Sep 10, 2020Updated 5 years ago
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- AES文件加密解密☆10Apr 26, 2023Updated 2 years ago
- Signed list of OpenPGP fingerprints for First Look employees☆15Feb 3, 2025Updated last year
- ☆13Nov 10, 2020Updated 5 years ago
- CNN for detecting malicious PDF☆11Jul 25, 2024Updated last year
- Practical String Searching☆12Dec 20, 2019Updated 6 years ago
- ☆13Aug 31, 2024Updated last year
- ☆10Jun 16, 2022Updated 3 years ago
- This is a recommended paper list for the course of Privacy Computing.☆10Mar 26, 2024Updated last year
- Audit du SMSI selon l'ISO 27001☆13Feb 23, 2022Updated 4 years ago
- Implementation of A New Burrows Wheeler Transform Markov Distance☆12Apr 19, 2020Updated 5 years ago
- Python 3 library to build YARA rules.☆13Oct 24, 2021Updated 4 years ago
- Economics of Ransomware | Dataset☆15May 2, 2018Updated 7 years ago
- A Multi-Threaded PE Export Collection Utility☆14May 13, 2023Updated 2 years ago
- My collection of scripts for Ghidra (https://github.com/NationalSecurityAgency/ghidra)☆10Sep 13, 2020Updated 5 years ago
- ☆11Feb 8, 2026Updated last month
- ☆12Apr 14, 2017Updated 8 years ago
- A minifilter driver to capture processes behavior from a filesystem prospective.☆16Oct 5, 2024Updated last year
- A chrome extension which will randomly redirect youtube views to a Rick Roll video.☆10Sep 22, 2018Updated 7 years ago
- The Ranflood ransomware contrast tool☆17Dec 18, 2024Updated last year
- ☆13Dec 30, 2021Updated 4 years ago
- This repo is created to perform I/O Request Packet (IRP) driven ransomware analysis where the IRP logs were collected during ransomware e…☆11Aug 14, 2020Updated 5 years ago
- A Python implementation of the non_iid tests in SP800-90B.☆13Aug 2, 2021Updated 4 years ago
- Tools for macOS Forensic Bootable media☆15May 20, 2020Updated 5 years ago
- ☆16Dec 21, 2023Updated 2 years ago
- Metasploit modules in testing☆14Jul 21, 2019Updated 6 years ago
- Code for the paper - Malicious URL Detection via Pretrained Language Model-Guided Multi-Level Feature Attention Network☆14Nov 25, 2023Updated 2 years ago