hiendt58 / machine-learningLinks
☆13Updated 7 years ago
Alternatives and similar repositories for machine-learning
Users that are interested in machine-learning are comparing it to the libraries listed below
Sorting:
- Dockerfile for AFL++ and helpful other tools☆21Updated 5 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Updated 6 years ago
- ☆21Updated 6 years ago
- A fuzz demo for windows driver based on IoControlCode☆12Updated 7 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago
- ☆14Updated 6 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 4 years ago
- ☆24Updated 8 years ago
- ☆22Updated last year
- My solutions for HackSys Extreme Vulnerable Driver☆12Updated 7 years ago
- Personal pwning toolset developed/used by myself. Use at your own risk.☆18Updated 3 years ago
- ROP Wargame repository☆26Updated 8 years ago
- Towards Generic Deobfuscation of Windows API Calls☆50Updated 6 years ago
- HEVD Multi-Exploit by m_101☆23Updated 7 years ago
- ☆22Updated 7 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35Updated 5 years ago
- Flare-On solutions☆37Updated 6 years ago
- ☆14Updated 2 years ago
- Solutions to HackSysExtremeVulnerableDriver challenges though my following of @FuzzySecurity's tutorials plus futher explanations where n…☆22Updated 8 years ago
- ¯\_(ツ)_/¯☆30Updated 5 years ago
- Malware Sandbox Emulation in Python @ HITCON 2018☆46Updated 7 years ago
- winAFL patch to enable network-based apps fuzzing☆37Updated 7 years ago
- ☆30Updated 6 years ago
- CVE-2020-8103 Link Resolution Privilege Escalation Vulnerability in Bitdefender Antivirus Free☆16Updated 5 years ago
- The place where my HackSys Extreme Vulnerable Driver exploits go.☆25Updated 7 years ago
- ☆43Updated 7 years ago
- A collection of anti disassembly techniques☆19Updated 8 years ago
- Write ups of solution for CTF challenges I solved☆25Updated 4 years ago
- Performing Buffer Overflow attack using stack smashing approach to obtain the shell. Given a C compiled vulnerable software, with the hel…☆17Updated 4 years ago
- Python based angr plug in for IDA Pro.☆35Updated 7 years ago