kulisu / max-exchange-grid-tradingView external linksLinks
Grid Trading for MAX Exchange (Python 3.6 implementation)
☆16Mar 10, 2020Updated 5 years ago
Alternatives and similar repositories for max-exchange-grid-trading
Users that are interested in max-exchange-grid-trading are comparing it to the libraries listed below
Sorting:
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Nov 10, 2020Updated 5 years ago
- Manticore Ransomware Emulation - Educational Purpose Only!☆10Aug 2, 2020Updated 5 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 6 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- Quantum Insert Backdoor POC☆11May 21, 2017Updated 8 years ago
- ☆11Jul 16, 2017Updated 8 years ago
- Decompile .Net code in Powershell☆13Sep 21, 2015Updated 10 years ago
- C# exfiltration tool☆13Sep 24, 2021Updated 4 years ago
- HECTOR☆20Mar 3, 2017Updated 8 years ago
- Historical Observations of Actionable Reputation Data☆13Jun 26, 2018Updated 7 years ago
- The tool for bugs detection in the process of tainted data processing (based on DBI Intel PIN).☆12Jul 23, 2015Updated 10 years ago
- Universal Malware Sample Encryption☆13Jan 5, 2024Updated 2 years ago
- Analytics for Accounting logs from Network devices☆18Mar 27, 2021Updated 4 years ago
- Network timing evaluation used to detect beacons, works with argus flow as the source☆20May 4, 2016Updated 9 years ago
- Simple little rootkit made in C☆13Feb 15, 2021Updated 5 years ago
- Automatically exported from code.google.com/p/checkout4mac☆13Oct 24, 2016Updated 9 years ago
- APT34/OILRIG leak☆11Jun 25, 2019Updated 6 years ago
- Collection of scripts for use with Carbon Black Cb Response API☆14May 7, 2022Updated 3 years ago
- ☆16Jul 14, 2020Updated 5 years ago
- ☆20Dec 19, 2017Updated 8 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆16Dec 19, 2018Updated 7 years ago
- Artifact for the paper Security Analysis of Vendor Implementations of the OPC UA Protocol for Industrial Control Systems at CPSIoTSec 202…☆13Nov 17, 2022Updated 3 years ago
- A tool to facilitate ROP Chain Development for XML Character Sanitization☆20May 9, 2019Updated 6 years ago
- Windows syscall fuzzer that I used in 2017 & 2018. Not much to say about it but maybe helpful to someone. At least syscall information it…☆20Nov 20, 2019Updated 6 years ago
- ☆16Jul 19, 2017Updated 8 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Synthesizing Framework Models for Symbolic Execution☆15Sep 15, 2016Updated 9 years ago
- Tools for auditing WAFS☆19Feb 25, 2022Updated 3 years ago
- Advance URL Fuzzing + Whois Domain running on python☆18Nov 8, 2022Updated 3 years ago
- Tweettioc Splunk App☆20Aug 25, 2020Updated 5 years ago
- Serverless Workshop☆16Dec 8, 2022Updated 3 years ago
- ☆21Dec 22, 2020Updated 5 years ago
- winafl with mopt mutators and afl fast power schedulers.☆22Feb 2, 2025Updated last year
- ☆20Jul 2, 2021Updated 4 years ago
- A set of scripts and analysis commands to harvest Tweets and identify content of interest, meaningful search criteria, and value keywords…☆21Oct 28, 2019Updated 6 years ago
- Fix acquired .evt - Windows Event Log files (Forensics)☆18Mar 29, 2016Updated 9 years ago
- Comprehensive Pivoting Framework☆20Sep 20, 2016Updated 9 years ago
- Open Development projects for TekDefense☆78Oct 5, 2016Updated 9 years ago
- Collection of data sources that can be used to provide context to security events☆26Jun 30, 2015Updated 10 years ago