A compiler for the Meta Attack Language
☆15Apr 11, 2022Updated 3 years ago
Alternatives and similar repositories for malcompiler
Users that are interested in malcompiler are comparing it to the libraries listed below
Sorting:
- A MAL language that demonstrates the Maven project structure☆23Feb 27, 2026Updated 3 weeks ago
- ☆16Jun 21, 2021Updated 4 years ago
- OWASP Ontology-driven Threat Modelling framework☆40Jul 11, 2023Updated 2 years ago
- Limited parsing of IEC61850 MMS mappings for scapy.☆12Oct 31, 2023Updated 2 years ago
- Tink's Postman Collections. More collections will be added.☆13Jan 19, 2026Updated 2 months ago
- envoylint.com takes an Envoy config and validates it for you.☆11Jul 6, 2025Updated 8 months ago
- Fuzzer for finding Open Mail Relays☆14Oct 21, 2020Updated 5 years ago
- Fuzzy IEC61850 Simulator☆20Aug 21, 2022Updated 3 years ago
- Python Faker provider for security related data☆41Aug 29, 2025Updated 6 months ago
- MUSIC: MUtation analySIs tool with High Configurability and Extensibility☆18Aug 4, 2023Updated 2 years ago
- A mutation tool for source and IR☆13Sep 6, 2018Updated 7 years ago
- ☆19Mar 21, 2024Updated 2 years ago
- ☆22Nov 26, 2019Updated 6 years ago
- A Kubernetes operator to manage resources in Keycloak☆15Feb 9, 2026Updated last month
- Group Signature Camenisch-Lysyanskaya Scheme C++, Pairing-Based Cryptography library☆14Feb 16, 2015Updated 11 years ago
- -notes and scripts for online course OffIOT☆12Jan 19, 2026Updated 2 months ago
- A Probabilistic modeling and simulation language for modern vehicle IT infrastructures☆11Jan 9, 2024Updated 2 years ago
- A suggested path for learning Vim's scripting language, VimL☆21Jun 14, 2014Updated 11 years ago
- Dynamic ControlFlow Graph and DataFlow Graph for Binary-based Optimization☆22Jul 5, 2017Updated 8 years ago
- Yet another an atomic deployment tool☆12Mar 11, 2020Updated 6 years ago
- Collection of notes for talks☆13Jan 6, 2024Updated 2 years ago
- ☆12Oct 25, 2023Updated 2 years ago
- Reverse proxy authenticating users within an organization in a secure manner☆26Nov 14, 2019Updated 6 years ago
- This repository consists of all the material required for cracking the coding rounds and technical interviews during placements.☆12Dec 25, 2020Updated 5 years ago
- ☆11Jul 21, 2019Updated 6 years ago
- An SSH honeypot written entirely in Go.☆12Dec 4, 2025Updated 3 months ago
- Elasticsearch, Logstash and Kibana Containers☆12Dec 6, 2022Updated 3 years ago
- ☆14May 30, 2023Updated 2 years ago
- Scan your AI/ML models for problems before you put them into production.☆11Mar 31, 2025Updated 11 months ago
- Latex template based on the typographic memoir class for formatting PhD dissertations. Suitable for any areas but devised for computer sc…☆18May 14, 2012Updated 13 years ago
- pathogen bundle of DrawIt plugin by DrChip☆11Sep 20, 2016Updated 9 years ago
- Secure Inference Resilient Against Malicious Clients☆14May 3, 2022Updated 3 years ago
- KeyCloak Extensions: Securing Realm Resources With Custom Roles☆15Aug 29, 2016Updated 9 years ago
- A controller that polls Athenz to update the ServiceRole and ServiceRoleBinding Istio custom resources.☆10Sep 17, 2024Updated last year
- Envoy Wasm filter for traffic tracing used in APIClarity.☆13Jun 19, 2024Updated last year
- Insider threat detection via bert☆23Jan 13, 2022Updated 4 years ago
- OrqueIO main source code repository☆22Updated this week
- A GraphQL API for Keycloak☆11Mar 7, 2025Updated last year
- Policy documents for services run by New Vector☆14Jul 21, 2023Updated 2 years ago