☆17Nov 22, 2021Updated 4 years ago
Alternatives and similar repositories for BETH_Dataset_Analysis
Users that are interested in BETH_Dataset_Analysis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆29Apr 16, 2021Updated 4 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- Repository for the paper titled "Attention-based Bi-LSTM for Anomaly Detection on Time-Series Data"☆22Apr 12, 2021Updated 4 years ago
- Purposed a network traffic classification and prediction model based on CNN, TCN and Attention mechanism.☆23Nov 13, 2023Updated 2 years ago
- Reimplementation of speech decoding 2022 paper by MetaAI☆14Oct 17, 2023Updated 2 years ago
- Simulating multiple agents of a swarm in Gazebo 2.2.3 (http://gazebosim.org/) on ROS Indigo (http://wiki.ros.org/indigo) communicating to…☆14Jun 23, 2017Updated 8 years ago
- Extended library for using direct system calls on windows☆17Feb 6, 2022Updated 4 years ago
- An Adaptive Misuse Detection System☆47Nov 4, 2024Updated last year
- This repository contains multiple exploits I have written for various CVEs and CTFs☆28Jul 27, 2025Updated 7 months ago
- ☆16Apr 12, 2023Updated 2 years ago
- Binary Only Thread Sanitizer☆18Aug 10, 2024Updated last year
- minimum ELF64 program to calculate its own SHA256.☆18Aug 22, 2022Updated 3 years ago
- Automating Detection and Severity Assessment of Atopic Dermatitis☆19Mar 28, 2022Updated 3 years ago
- Query complex neural network graph structures in Torch☆28Mar 10, 2016Updated 10 years ago
- Generalised UDRL☆37May 12, 2022Updated 3 years ago
- Generate lua call graph☆16Apr 23, 2023Updated 2 years ago
- ☆13Oct 1, 2020Updated 5 years ago
- Project template for windows kernel development.☆14Jun 25, 2023Updated 2 years ago
- ☆16Jul 25, 2025Updated 8 months ago
- Torch implementation of Fischer et al. FlowNet training code☆31Apr 5, 2017Updated 8 years ago
- CVE-2025-62215 is an Elevation of Privilege (EoP) vulnerability in the Windows Kernel, disclosed in November 2025 and confirmed to be act…☆29Nov 14, 2025Updated 4 months ago
- ☆13Oct 17, 2021Updated 4 years ago
- ☆13Oct 27, 2022Updated 3 years ago
- Automatically exported from code.google.com/p/idapython☆20Apr 14, 2015Updated 10 years ago
- ☆21Dec 24, 2022Updated 3 years ago
- OCSF Schema Validation☆12Dec 13, 2024Updated last year
- Base85 is a C library to convert from plain to base85 (RFC 1924) and vice versa suitable for embedded systems.☆23Oct 20, 2019Updated 6 years ago
- WinAFL modified for RDP client fuzzing☆20Dec 18, 2022Updated 3 years ago
- An evaluation tool for memory safety sanitizers.☆19Feb 11, 2026Updated last month
- ☆33Sep 13, 2024Updated last year
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- Registry of grants and other funding to open source software (OSS) projects☆16Updated this week
- Utility functions for dbt projects running on Athena☆12Mar 25, 2025Updated last year
- Powering the OpenTofu Registry Search (beta)☆20Updated this week
- DOM fuzzers - not maintained anymore☆17Oct 10, 2019Updated 6 years ago
- python模拟登陆csdn☆11Jun 23, 2017Updated 8 years ago
- ☆20Dec 4, 2023Updated 2 years ago
- A curated list of awesome hyperparameters for deep learning☆78Oct 6, 2017Updated 8 years ago
- Identifying malicious/benign network traffic using classification methods.☆10Sep 27, 2022Updated 3 years ago