Python library for managing VirtualBox remotely using it's SOAP API
☆20Feb 3, 2025Updated last year
Alternatives and similar repositories for remote-virtualbox
Users that are interested in remote-virtualbox are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆11Mar 9, 2021Updated 5 years ago
- couchdb remote command exec.☆14Mar 27, 2018Updated 7 years ago
- ☆11Sep 3, 2020Updated 5 years ago
- AVCLASS++: Yet Another Massive Malware Labeling Tool☆13Dec 7, 2019Updated 6 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Dec 27, 2020Updated 5 years ago
- Golang parser for OLE files☆33Dec 4, 2025Updated 3 months ago
- Code for paper: "Spinning Language Models: Risks of Propaganda-as-a-Service and Countermeasures"☆21Jun 6, 2022Updated 3 years ago
- 用于网站(HTTP)自动化判断开放和网页快照拍摄☆12Jan 25, 2021Updated 5 years ago
- CryptAPI's Python library☆14Dec 11, 2024Updated last year
- Code for identifying natural backdoors in existing image datasets.☆15Aug 24, 2022Updated 3 years ago
- a database query builder for CTFer(出题专用/开发阶段/慎用)☆33May 28, 2018Updated 7 years ago
- Credentials recovery project☆13Dec 15, 2017Updated 8 years ago
- Confluence Widget Connector path traversal (CVE-2019-3396)☆22Oct 4, 2019Updated 6 years ago
- ☆20Jun 24, 2022Updated 3 years ago
- Web application to visualize GreyNoise API data☆21Dec 4, 2018Updated 7 years ago
- Explainable AI for Android Malware Detection: Towards Understanding Why the Models Perform So Well?☆14Aug 24, 2022Updated 3 years ago
- ☆25Mar 24, 2023Updated 2 years ago
- Parallel ssdeep clustering kit☆20Dec 24, 2017Updated 8 years ago
- Golang bindings for the Binary Ninja Arm64 Disassembler.☆14Mar 16, 2026Updated last week
- a reCaptcha solver using a fine tuned pretrained model (EfficientNetM)☆16Jan 13, 2023Updated 3 years ago
- Deobfuscated + reverse engineered javascript malware☆30Jul 20, 2018Updated 7 years ago
- ☆22Oct 29, 2023Updated 2 years ago
- Unicorn Engine based running of SecureROM☆11Sep 13, 2022Updated 3 years ago
- Example of the attack described in the paper "Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization"☆21Oct 25, 2019Updated 6 years ago
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- `macosx.internal` -> `macosx`☆14Aug 23, 2021Updated 4 years ago
- Download a Bunch of Malware for Demos and Testing☆13Sep 28, 2018Updated 7 years ago
- 🌊 Dockerfiles for apps I use. Also take a look at https://github.com/security-dockerfiles☆25Dec 24, 2020Updated 5 years ago
- socket for handling chrome-developer-protocol connections☆18Apr 28, 2024Updated last year
- Attack data☆26Apr 20, 2018Updated 7 years ago
- An Apple Silicon hooking library written in C☆13Sep 19, 2021Updated 4 years ago
- A standalone Java Decompiler GUI☆14Nov 14, 2021Updated 4 years ago
- ☆17Dec 1, 2020Updated 5 years ago
- Accompanying code for blog post "Mapping iOS Persistence Attack Surface using Corellium"☆11Jun 10, 2025Updated 9 months ago
- Grepify the GUI Regex Text Scanner for Code Reviewers☆23Apr 15, 2013Updated 12 years ago
- A Swift 5 implementation of Apple's proprietary BXDIFF50 patching algorithm used during OTA OS upgrades☆15Feb 16, 2021Updated 5 years ago
- Malice Office/OLE/RTF Plugin☆13Aug 29, 2018Updated 7 years ago
- Description of Apple's LEAP ISA☆16Nov 21, 2022Updated 3 years ago
- Automatically exported from code.google.com/p/verify-sigs☆18Sep 2, 2016Updated 9 years ago