adversarial machine learning for anti-malware software
☆12May 17, 2018Updated 7 years ago
Alternatives and similar repositories for advML
Users that are interested in advML are comparing it to the libraries listed below
Sorting:
- Samsung CTF 2017 Problems. https://sctf.codeground.org☆24Sep 3, 2018Updated 7 years ago
- ☆10Aug 26, 2016Updated 9 years ago
- Exploit for hardcore pwnable☆35Apr 14, 2019Updated 6 years ago
- Script for automating Linux memory capture and analysis☆13May 6, 2020Updated 5 years ago
- ☆11Mar 12, 2021Updated 4 years ago
- CVE-2017-9791☆27Jul 8, 2017Updated 8 years ago
- Handy WMI query tool.☆12Jun 20, 2016Updated 9 years ago
- ctfs write-up☆30Jul 21, 2023Updated 2 years ago
- Open-CTF based on Christmas CTF Platform☆11Feb 25, 2016Updated 10 years ago
- Guessing number with Genetic Algoithm☆12Feb 17, 2021Updated 5 years ago
- A simple script for exploit RCE for Struts 2 S2-053(CVE-2017-12611)☆37Sep 8, 2017Updated 8 years ago
- Java class name obfuscation via classloader segregation and graph colouring☆18Jul 4, 2017Updated 8 years ago
- defcon framework by SeoulPlusBadass☆18Dec 11, 2022Updated 3 years ago
- ☆18Jun 21, 2019Updated 6 years ago
- malware-traffic-analysis.net PCAPs repository.☆37Jun 9, 2016Updated 9 years ago
- A PoC demonstrating techniques exploiting CVE-2016-5696 Off-Path TCP Exploits: Global Rate Limit Considered Dangerous☆40Aug 23, 2016Updated 9 years ago
- dForensics Tools☆22Sep 12, 2015Updated 10 years ago
- Proof of Concept example of Android Malware used for Research Purposes☆23Dec 22, 2016Updated 9 years ago
- SUB/PUSH/POP based ASCII shellcode encoder☆23Sep 7, 2017Updated 8 years ago
- The Operating System on x86_64 Architecture☆15Mar 3, 2021Updated 5 years ago
- *For research purposes only*. Some proof of concept code to trig vulnerability or exploit them that I found before.☆25Oct 24, 2025Updated 4 months ago
- Sha256 vulnerability for full rounds. Circular hash attack.☆156Jun 28, 2017Updated 8 years ago
- useful crypto resources for CTF competition.☆19Mar 2, 2019Updated 7 years ago
- Samsung CTF 2018 Problems. https://research.samsung.com/sctf2018☆20Jul 6, 2018Updated 7 years ago
- All Presentations at CodeEngn Conference☆106Jul 6, 2025Updated 7 months ago
- 'SWEETMON' is a fuzzer monitoring service based python3 + django. User can check their fuzzers and crashes on the web. It can reduce repe…☆17Jun 5, 2020Updated 5 years ago
- soFrida - Dynamic Analysis Tool for Mobile Applications☆113Mar 31, 2020Updated 5 years ago
- repo for ctf☆22Apr 15, 2018Updated 7 years ago
- ☆27Aug 25, 2020Updated 5 years ago
- A software framework for global sparse analyzers and their verified validators☆22Oct 25, 2017Updated 8 years ago
- 어셈블리어를 배워서 써먹자☆21Jun 26, 2018Updated 7 years ago
- ctfwriteup☆25Mar 27, 2019Updated 6 years ago
- 2018 TenDollar CTF☆30Dec 5, 2018Updated 7 years ago
- SQL Injection wargame☆25May 2, 2018Updated 7 years ago
- The old school Tetris game in addition with an AI that learns evolutionary how to play this game☆24Oct 28, 2019Updated 6 years ago
- [C#]Main.exe < - > [C_DLL] < - > [C_KERNEL] = Memory_Editor via Kernel☆33Aug 13, 2019Updated 6 years ago
- Merge all Yara rules from official Yara github repository in one .yar file☆31Jun 22, 2018Updated 7 years ago
- Implementation of the DIMVA 2017 publication "Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps"☆69Mar 7, 2022Updated 3 years ago
- Triton based R2 plugin for concolic execution and total control☆33Nov 26, 2018Updated 7 years ago