greyhat-academy / malbashView external linksLinks
malicious bash scripts
☆10Apr 3, 2022Updated 3 years ago
Alternatives and similar repositories for malbash
Users that are interested in malbash are comparing it to the libraries listed below
Sorting:
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Jul 19, 2020Updated 5 years ago
- A ransomware written in python for Windows☆13Aug 10, 2022Updated 3 years ago
- Dataset of packed ELF samples☆21Jan 24, 2026Updated 3 weeks ago
- A collection of beautified and commented samples of malware implemented in Bash☆20Apr 4, 2023Updated 2 years ago
- ☆10Dec 30, 2020Updated 5 years ago
- A macrospin simulation tool for nanoparticles☆12Dec 4, 2024Updated last year
- ☆12Aug 4, 2018Updated 7 years ago
- Mock STIX data demonstrating the new data source representation☆16Sep 13, 2023Updated 2 years ago
- The doas equivalent for sudoedit.☆13Jun 26, 2025Updated 7 months ago
- A Guide for Encode Categorical Variables, with implementations and examples in Python.☆11Sep 9, 2020Updated 5 years ago
- Whitepaper for the coraza-server implementation☆11Mar 16, 2022Updated 3 years ago
- VRM VTuberKit vroid studio☆10Mar 11, 2019Updated 6 years ago
- Factorio Mod - Big Brother☆10Nov 14, 2021Updated 4 years ago
- A sample Server/Client game writen with C#. This application uses a custom message protocol on TCPClient & TCPListener with asynchronous☆11May 17, 2019Updated 6 years ago
- AES文件加密解密☆10Apr 26, 2023Updated 2 years ago
- 使用卷积神经网络识别恶意软件,其特点是把文件的每个字节都当做输入☆16Oct 14, 2024Updated last year
- Machine settings for Creality CR6SE☆10Dec 18, 2020Updated 5 years ago
- Adahpxson:1ue8Rv5a Carinfkwob:AX08h4RV Cammiexogzh:kdT2P07u Brittaniengsrn:1Ojx5w4U Tamekiaieafz:8As30Cwj Sherripzulh:z70axU5o Shirlenece…☆33Mar 12, 2015Updated 10 years ago
- "BadPart: Unified Black-box Adversarial Patch Attacks against Pixel-wise Regression Tasks"☆13May 10, 2024Updated last year
- A free website to help you rescue, inform and donate your pets with love! 🐶💜🐱☆13Jan 5, 2026Updated last month
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- [ICLR 2025 SCI-FM Workshop] Lemur: Log Parsing with Entropy Sampling and Chain-of-Thought Merging☆13Mar 27, 2025Updated 10 months ago
- ☆10Aug 17, 2020Updated 5 years ago
- Credentials recovery project☆13Mar 25, 2022Updated 3 years ago
- Automatically batch render videos in folders based on presets using Handbrake - Multi-Node-Support☆10Dec 11, 2022Updated 3 years ago
- Code repository for blog article series https://nixcademy.com/2023/10/31/cpp-with-nix-in-2023-part-1-shell/☆11Jan 11, 2024Updated 2 years ago
- MATLAB toolbox for performing modal analysis using experimental data☆11Jun 23, 2022Updated 3 years ago
- ☆10Jun 16, 2022Updated 3 years ago
- A mixed theme package for FVWM.☆13Jan 9, 2016Updated 10 years ago
- [ICLR 2026] The official implementation of the paper "MLP Memory: A Retriever-Pretrained Memory for Large Language Models".☆46Jan 28, 2026Updated 2 weeks ago
- Implementation of A New Burrows Wheeler Transform Markov Distance☆12Apr 19, 2020Updated 5 years ago
- FEM micromagnetic simulator☆11Feb 6, 2026Updated last week
- CNN for detecting malicious PDF☆11Jul 25, 2024Updated last year
- Audit du SMSI selon l'ISO 27001☆13Feb 23, 2022Updated 3 years ago
- Simple MATLAB toolbox for deep learning network: Version 1.0.3☆16Apr 16, 2019Updated 6 years ago
- ☆10Jul 12, 2021Updated 4 years ago
- React shadow DOM that works well with styled-components☆12Nov 18, 2018Updated 7 years ago
- This is a recommended paper list for the course of Privacy Computing.☆10Mar 26, 2024Updated last year
- ☆16Feb 13, 2022Updated 4 years ago