This is a sample approach of data analysis in security scene.
☆18Oct 21, 2018Updated 7 years ago
Alternatives and similar repositories for secml
Users that are interested in secml are comparing it to the libraries listed below
Sorting:
- mruby running inside the bare-metal hypervisor☆19Mar 8, 2020Updated 5 years ago
- https://github.com/sk2sat/emu のほうで一から作り直ししてます☆24Jul 8, 2017Updated 8 years ago
- Convert libvirt-QEMU-save (LQS) files to raw memory files☆14Sep 22, 2018Updated 7 years ago
- ☆14Jan 12, 2018Updated 8 years ago
- This is a fuzzer for Windows SEH buffer overflow.☆15Oct 17, 2017Updated 8 years ago
- Past presentation materials☆10Jul 10, 2018Updated 7 years ago
- A Multithread PcapNG capturing tool with Hardware timestamping☆10Nov 6, 2016Updated 9 years ago
- CVE-2014-1303 (WebKit Heap based BOF) proof of concept for Linux☆24Aug 10, 2025Updated 6 months ago
- ☆15Oct 4, 2012Updated 13 years ago
- Simple high-interactive client honeypot☆25Oct 15, 2017Updated 8 years ago
- gdbserver implementation on BitVisor☆25Nov 8, 2017Updated 8 years ago
- ソーマ・カーネル・プロジェクト☆10Apr 12, 2017Updated 8 years ago
- Codec tools for the twitter mux protocol☆12Apr 21, 2016Updated 9 years ago
- ☆10Oct 30, 2016Updated 9 years ago
- Simple tool to regularly pool Tor HSDirs for hidden service descriptors☆10Jul 3, 2015Updated 10 years ago
- Lepus-CTF frontend application☆11Nov 2, 2015Updated 10 years ago
- Basic x86 Symbolic Execution for educational purposes☆18May 8, 2017Updated 8 years ago
- Vulnerable Web App☆13Nov 11, 2015Updated 10 years ago
- 「例解UNIXプログラミング教室」収載のコードサンプル集☆10Dec 15, 2021Updated 4 years ago
- Make datasets like FFRI Dataset☆13Jul 23, 2024Updated last year
- A tool to retrieve malware directly from the source for security researchers.☆39May 10, 2017Updated 8 years ago
- A variety of content chunking algorithms with a common API in rust☆18Jun 18, 2023Updated 2 years ago
- The C3, SMT/SAT solver written in C.☆35Aug 10, 2025Updated 6 months ago
- Sample Program for rust-uefi. It's running as a UEFI apps written by Rust.☆16Sep 14, 2019Updated 6 years ago
- 論文を読んだふりしてライバルに差をつけろ☆17Dec 31, 2016Updated 9 years ago
- Unicorn PE function runner☆59Jul 4, 2017Updated 8 years ago
- Tool for dropping malware from EK☆40Feb 9, 2018Updated 8 years ago
- Code for the paper EvilCoder: Automated Bug Insertion at ACSAC 2016☆46Jan 18, 2017Updated 9 years ago
- A Pictorial Book of Tor Hidden Services.☆25Dec 1, 2017Updated 8 years ago
- Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware☆51Jul 4, 2019Updated 6 years ago
- 382 Slayer Leecher Keywords.☆10Apr 19, 2021Updated 4 years ago
- Similarity Analysis to Defeat Malware Compiler Variations☆25Oct 3, 2017Updated 8 years ago
- Towards Generic Deobfuscation of Windows API Calls☆50May 21, 2019Updated 6 years ago
- a summary of linux rootkits published on GitHub☆192May 7, 2020Updated 5 years ago
- The controllers and config for custom resources pertaining to egressing logs and metrics.☆24Jul 10, 2020Updated 5 years ago
- VMI-Unpack - A Virtual Machine Introspection (VMI) based generic unpacker.☆57Jan 16, 2020Updated 6 years ago
- ☆28Jan 4, 2018Updated 8 years ago
- Reverse Engineering of NVIDIA's Tegra driver for Linux☆35Jul 17, 2017Updated 8 years ago
- 技術書典7で頒布した「実践入門 Kubernetesカスタムコントローラへの道」の本文中に掲載したサンプルコード用のリポジトリです☆24Mar 7, 2023Updated 2 years ago