☆16Mar 5, 2018Updated 8 years ago
Alternatives and similar repositories for decanter
Users that are interested in decanter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- a very simple rootkit for fun☆19Nov 6, 2018Updated 7 years ago
- pcapML standardizes network traffic analysis datasets by directly encoding metadata information into raw traffic captures☆28Oct 21, 2022Updated 3 years ago
- SMVs: Enforcing Least Privilege Memory Views for Multithreaded Applications☆13Jul 7, 2022Updated 3 years ago
- Flow-based SSH intrusion detection system (NfSen plugin)☆41Dec 10, 2015Updated 10 years ago
- Passive DNS Dataset of Domain Resolutions☆18Jun 14, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Development guide for Volatility Plugins☆22Sep 6, 2017Updated 8 years ago
- Python code injection library☆10Jul 30, 2018Updated 7 years ago
- ssdeep based clustering tool☆14Jan 17, 2016Updated 10 years ago
- Add POST body excerpt to Bro's HTTP log☆14Dec 10, 2025Updated 3 months ago
- A websocket proxy☆13Nov 13, 2017Updated 8 years ago
- ☆21Nov 7, 2023Updated 2 years ago
- Sumneko annotations for the Wireshark Lua API☆15Feb 7, 2026Updated last month
- Download a demo version of Open Network Insight, which can be run standalone on a windows laptop using Winpython https://sourceforge.net/…☆10Feb 1, 2017Updated 9 years ago
- A tool for estimating a system's information leakage via Machine Learning☆10Jun 28, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- SDN Security and Monitoring Framework☆16Dec 8, 2022Updated 3 years ago
- ☆22Jul 19, 2015Updated 10 years ago
- Given a string determine the possible hashing algorithms used to produce that string.☆17Nov 23, 2020Updated 5 years ago
- This is the Android device configuration for Sony Xperia XZ1 Compact (yoshino platform).☆10May 30, 2025Updated 10 months ago
- From Doxygen documentation, create a Docset for use in Dash or Zeal.☆26Mar 1, 2026Updated 3 weeks ago
- Never use printf to debug again in c99☆20Dec 1, 2021Updated 4 years ago
- Defense from the 2020 Microsoft Evasion Competition☆17Apr 27, 2021Updated 4 years ago
- A library for adversarial classifier evasion☆43Dec 4, 2014Updated 11 years ago
- ☆43Jun 14, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- This is a mapping of CPEs to package urls created by using VulnerableCode's data☆10Aug 14, 2020Updated 5 years ago
- Deliberately insecure Kubernetes test clusters built using kind☆13Aug 16, 2019Updated 6 years ago
- (Inverse Path | F-Secure) Hardware Security Team - Security Advisories☆24Dec 15, 2021Updated 4 years ago
- Texpad Knowledge Base -- Resources for Texpad Users☆24Nov 19, 2021Updated 4 years ago
- Convert PHP code into PHP opcode, use GaussianNB for training☆10Mar 21, 2020Updated 6 years ago
- DHCP attack tool☆21Oct 4, 2024Updated last year
- datacon比赛方向三-攻击源与攻击者分析writeup☆93May 26, 2019Updated 6 years ago
- As seen at DEF CON and O'Reilly Live Trainings☆24Jul 30, 2025Updated 8 months ago
- Effortlessly insert citations from BibTeX into texts written in Pandoc or LaTeX☆21Dec 8, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Simulation environment for attacks on computer networks☆22Jun 1, 2022Updated 3 years ago
- An ICAP Server with yara scanner for URL and content.☆58Dec 19, 2024Updated last year
- ☆26Oct 13, 2015Updated 10 years ago
- GridAttackAnalyzer: Smart Grid Attack Analysis Framework☆22Feb 15, 2022Updated 4 years ago
- A simple Shellshock scanner in python☆39Oct 12, 2014Updated 11 years ago
- Asset inventory of over 800 public bug bounty programs.☆12Jun 12, 2023Updated 2 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Dec 20, 2014Updated 11 years ago