adversarial machine learning for anti-malware software
☆12May 17, 2018Updated 7 years ago
Alternatives and similar repositories for advML
Users that are interested in advML are comparing it to the libraries listed below
Sorting:
- Samsung CTF 2017 Problems. https://sctf.codeground.org☆24Sep 3, 2018Updated 7 years ago
- Tool for analysis of Windows Prefetch files☆26Nov 11, 2018Updated 7 years ago
- ☆10Aug 26, 2016Updated 9 years ago
- ☆14Jan 12, 2018Updated 8 years ago
- A simple script for exploit RCE for Struts 2 S2-053(CVE-2017-12611)☆37Sep 8, 2017Updated 8 years ago
- Script for automating Linux memory capture and analysis☆13May 6, 2020Updated 5 years ago
- malware-traffic-analysis.net PCAPs repository.☆37Jun 9, 2016Updated 9 years ago
- Guessing number with Genetic Algoithm☆12Feb 17, 2021Updated 5 years ago
- Sha256 vulnerability for full rounds. Circular hash attack.☆156Jun 28, 2017Updated 8 years ago
- ctfs write-up☆30Jul 21, 2023Updated 2 years ago
- ☆18Jun 21, 2019Updated 6 years ago
- Publicly released tools/plugins from PPP for DEFCON 25 CTF Finals☆144Oct 28, 2018Updated 7 years ago
- Purposely vulnerable ActiveX Control to teach about exploitation in a browser-based environment.☆71Dec 5, 2014Updated 11 years ago
- A PoC demonstrating techniques exploiting CVE-2016-5696 Off-Path TCP Exploits: Global Rate Limit Considered Dangerous☆40Aug 23, 2016Updated 9 years ago
- AVR assembly plugin for Binary Ninja☆12Jun 6, 2018Updated 7 years ago
- 궁금한거 있으면 물어봐주세요☆26Mar 2, 2017Updated 9 years ago
- Open-CTF based on Christmas CTF Platform☆11Feb 25, 2016Updated 10 years ago
- ☆12Jun 14, 2017Updated 8 years ago
- The Operating System on x86_64 Architecture☆15Mar 3, 2021Updated 5 years ago
- Sample code for ret2usr (and ret2dir) kernel attacks☆10Nov 23, 2016Updated 9 years ago
- windows utility code☆88Updated this week
- ☆16Oct 4, 2012Updated 13 years ago
- repo for ctf☆22Apr 15, 2018Updated 7 years ago
- x86 emulator by Golang☆13Jun 29, 2017Updated 8 years ago
- repository for scratch code☆14Jun 21, 2016Updated 9 years ago
- All Presentations at CodeEngn Conference☆107Jul 6, 2025Updated 8 months ago
- defcon framework by SeoulPlusBadass☆18Dec 11, 2022Updated 3 years ago
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆147Jul 30, 2017Updated 8 years ago
- 2016 공공데이터 분석 및 시각화 프로젝트☆10Jul 11, 2016Updated 9 years ago
- An api to extract network data from github and a client to draw its force-directed graphs☆10May 7, 2018Updated 7 years ago
- soFrida - Dynamic Analysis Tool for Mobile Applications☆113Mar 31, 2020Updated 5 years ago
- SUB/PUSH/POP based ASCII shellcode encoder☆23Sep 7, 2017Updated 8 years ago
- Triton based R2 plugin for concolic execution and total control☆33Nov 26, 2018Updated 7 years ago
- 어셈블리어를 배워서 써먹자☆21Jun 26, 2018Updated 7 years ago
- CVE-2017-7494 - Detection Scripts☆63May 26, 2017Updated 8 years ago
- Python script to monitor web pages.☆22Aug 30, 2019Updated 6 years ago
- dForensics Tools☆22Sep 12, 2015Updated 10 years ago
- ☆15Mar 25, 2017Updated 8 years ago
- Proof of Concept example of Android Malware used for Research Purposes☆23Dec 22, 2016Updated 9 years ago