Code Samples for O'Reilly's Network Security Through Data Analysis
☆33Aug 2, 2018Updated 7 years ago
Alternatives and similar repositories for nsda_examples
Users that are interested in nsda_examples are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code for the paper "Optimal Off-Policy Evaluation from Multiple Logging Policies"☆15Jul 17, 2021Updated 4 years ago
- Simple single-file FUSE implementation of copy-on-write☆10Aug 14, 2014Updated 11 years ago
- ☆16Nov 14, 2016Updated 9 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆10Sep 11, 2020Updated 5 years ago
- Osmocom dockerfiles, mostly for test automation; mirror of https://gitea.osmocom.org/osmocom/docker-playground☆23Feb 25, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A Pokédex developed as an Android application in the context of a Human-Computer Interaction class.☆12Jun 24, 2019Updated 6 years ago
- anime face detector and model learner with deep learning.☆15Sep 22, 2015Updated 10 years ago
- Security Tools written in Golang☆12Sep 2, 2020Updated 5 years ago
- SQLite3 with encryption support☆23Jan 3, 2020Updated 6 years ago
- vstruct based dissectors for various file/protocol formats☆15Jul 27, 2017Updated 8 years ago
- 🇵🇹 A list of neat projects made in Portugal☆12Feb 13, 2025Updated last year
- Frontend for Codex Gigas☆21Mar 6, 2017Updated 9 years ago
- A repository of scripts and files related to the CryptoWall version 3 threat☆12Mar 3, 2016Updated 10 years ago
- Vivisect Structure Definition/Parsing Library☆23Jul 25, 2017Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Interfaces with a Metasploit RPC instance to generate .NET executables that run x86/x64 shell code in a platform-agnostic way. One binary…☆24Sep 28, 2017Updated 8 years ago
- Telegram Bot, Anonymous Message, بات تلگرام☆10May 19, 2018Updated 7 years ago
- ☆19Sep 2, 2018Updated 7 years ago
- ☆14Jan 5, 2021Updated 5 years ago
- Methods of C2☆22Jul 15, 2015Updated 10 years ago
- a tool for downloading the BugTraq Ids database☆13May 22, 2023Updated 2 years ago
- Lepus-CTF frontend application☆11Nov 2, 2015Updated 10 years ago
- ☆12Sep 25, 2021Updated 4 years ago
- SCTP implementation (before jSS7 moved to Netty)☆26Jan 9, 2024Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Generate quotes for an arbitrary Twitter account via a trained Markov Chain.☆13Oct 30, 2018Updated 7 years ago
- My usercode area☆15Dec 21, 2016Updated 9 years ago
- dns logger for passive dns collection☆42May 27, 2012Updated 13 years ago
- Sorta reverse implementation of ShoVAT - Also includes NMAP banner regex results☆16Dec 28, 2018Updated 7 years ago
- C# bindings for the Metasploit RPC☆20Nov 7, 2016Updated 9 years ago
- API Tools☆27Apr 18, 2016Updated 9 years ago
- Collection of resources on plasticity loss in deep reinforcement learning☆23Nov 12, 2024Updated last year
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Jan 8, 2019Updated 7 years ago
- Network and USB protocol fuzzing toolkit.☆34Jul 27, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆32Jun 19, 2024Updated last year
- VBScript & VBA source-to-source deobfuscator with partial-evaluation☆80Aug 7, 2024Updated last year
- Collaborative web dashboard for RedTeam pentesters☆21Oct 28, 2019Updated 6 years ago
- A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the st…☆27Apr 20, 2014Updated 11 years ago
- Combine vim-projectionist with vim-dirvish!☆12May 14, 2021Updated 4 years ago
- ☆18Jul 25, 2024Updated last year
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆17Jul 22, 2022Updated 3 years ago