sandy9999 / Sih_Rk312_winterfellView external linksLinks
Cyber Offenders are related CDR/IPDRs are very important for LEAs, the given CDR/IPDR data is in a Spreadsheet/Excel/CSV/Notepad (Rows & Column Structure) file format. Desired Solution: The solution should take different input file formats like .XLSX, .CSV, TXT. and it shall convert into Info Graphical and Data Visualizer forms with connected R…
☆17Aug 4, 2020Updated 5 years ago
Alternatives and similar repositories for Sih_Rk312_winterfell
Users that are interested in Sih_Rk312_winterfell are comparing it to the libraries listed below
Sorting:
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- Discord Scripts☆12Nov 30, 2019Updated 6 years ago
- BruteProxy.py framework for brute-forcing via HTTP/HTTPS requests with looping proxies.☆12Jan 12, 2026Updated last month
- An Advanced PHP Cryptography Framework☆16Feb 12, 2024Updated 2 years ago
- A collection of personal ZAP scripts☆13Apr 10, 2023Updated 2 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Oct 13, 2020Updated 5 years ago
- AliGuard PHP WAF☆12Feb 16, 2024Updated 2 years ago
- Netcap Tensorflow Deep Neural Network☆15Apr 26, 2020Updated 5 years ago
- DoS attack, Ataque DoS a redes Wifi, herramienta capaz de Expulsar a todos los usuarios de una red Wifi dejandolos sin acceso a internet.☆11Oct 28, 2020Updated 5 years ago
- strongDM SDK for the Python programming language.☆15Updated this week
- Automated Real-Time Threat Hunting with ATD, Active Response and Elasticsearch/Kibana☆10Aug 17, 2018Updated 7 years ago
- Kestrel Jupyter Notebook Kernel☆10Oct 19, 2023Updated 2 years ago
- Slack integration for MagicMirror²☆10Sep 9, 2020Updated 5 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Chitrarth: Bridging Vision and Language for a Billion People☆13Feb 12, 2025Updated last year
- Transform EQL detection rules to VQL artifacts☆12Nov 12, 2021Updated 4 years ago
- Various components we use in labs☆10Oct 30, 2020Updated 5 years ago
- Monitor Files and Folders for Changes in Real Time .☆11Jan 10, 2019Updated 7 years ago
- Vulnerability Knowledge Base comparison tool☆13Feb 9, 2022Updated 4 years ago
- Upload, save and run keystroke injection payloads with an ESP8266 + ATMEGA32U4☆12Aug 14, 2019Updated 6 years ago
- Python based summer project☆10Feb 28, 2018Updated 7 years ago
- Solution to SIH 22 problem statement Smart Attendance☆10Jun 20, 2023Updated 2 years ago
- SIEM USE Case Selection Methodology☆17Sep 18, 2020Updated 5 years ago
- WiP - cve-search next gen☆13Jan 18, 2020Updated 6 years ago
- Stanford CoreNLP NER addon for Apache Tika's NamerEntityParser☆13Feb 26, 2022Updated 3 years ago
- ☆18Jul 30, 2017Updated 8 years ago
- In this project, we need to find out commercial products listed on Google that refer to the same entity across Amazon by comparing the si…☆11Nov 7, 2016Updated 9 years ago
- Privacy Protection Application (PPA): Code and instructions for building two tools for processing vehicle trip, or trajectory, data to pr…☆13Oct 8, 2018Updated 7 years ago
- Post-Auth RCE & Persistence on UOKOO Security Cameras☆12Nov 17, 2020Updated 5 years ago
- Query.AI plugin for Kibana☆13Nov 10, 2019Updated 6 years ago
- Official Procurement Living Application example for Bonita☆11Nov 26, 2025Updated 2 months ago
- Sn0ffer - Make sound/noise/music with your network connection!☆20Jul 1, 2016Updated 9 years ago
- This project was created as a part of Smart India Hackathon 2022 and aims to track nutritinal requirement and calorie intake of Students …☆11Sep 2, 2022Updated 3 years ago
- ☆10Jan 8, 2018Updated 8 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆13Jun 13, 2020Updated 5 years ago
- ☆13Apr 8, 2022Updated 3 years ago
- A Zeek package that detects Zoom logins and meeting joins☆12Apr 15, 2020Updated 5 years ago
- data synthesis tool to simplify privacy preservation☆15Feb 14, 2023Updated 3 years ago
- Phishing Campaign Toolkit☆11Mar 15, 2020Updated 5 years ago