my .vimrc in ubuntu
☆14May 2, 2016Updated 9 years ago
Alternatives and similar repositories for vimrc
Users that are interested in vimrc are comparing it to the libraries listed below
Sorting:
- Create your own Mirai botnet using Docker.☆31Oct 30, 2022Updated 3 years ago
- xinetd-kafel is a more secure replacement for xinetd with secure computing (seccomp, only work on linux)☆18Jun 9, 2018Updated 7 years ago
- KVM-based virtual machine introspection for malware analysis☆29May 11, 2017Updated 8 years ago
- PEDA - Python Exploit Development Assistance for GDB☆66Jul 17, 2023Updated 2 years ago
- Malware detonation platform Polygon integration☆10Aug 1, 2023Updated 2 years ago
- ☆78Aug 20, 2018Updated 7 years ago
- Linux kernel source tree☆10Oct 11, 2017Updated 8 years ago
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- Pseudo-Intel-CET functionality plugin based on QEMU 8.2.2 plugin system, with minor modifications to QEMU TCG body code to adapt to Glibc…☆14Jun 5, 2024Updated last year
- Ransomware script based on AES-CBC (Fernet Token) and RSA (PKCS1-OAEP) cryptosystem.☆15Dec 3, 2022Updated 3 years ago
- AIS3 2017 Binary Exploitation☆38Sep 3, 2017Updated 8 years ago
- Metadefender Core (Metascan v.4 and v.3) analysis module for Viper malware analysis framework☆10Jan 6, 2021Updated 5 years ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- The artifact for NDSS '25 paper "ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environmen…☆14Oct 16, 2025Updated 4 months ago
- A simple Mali 6xx/7xx register interface model that doesn't do any rendering.☆13Jan 29, 2016Updated 10 years ago
- Fuzzing Secure Monitor Implementations☆19Aug 3, 2024Updated last year
- Debian10-Linux4.19 Hook sys_call_table By IDT☆11May 9, 2020Updated 5 years ago
- Known WannCrypt Bitcoin addresses☆10Jul 17, 2017Updated 8 years ago
- Integration fork of QEMU focusing on XNU platforms (arm, aarch64, etc)☆12Dec 12, 2022Updated 3 years ago
- A PDF that shows its own MD5☆11Jan 2, 2023Updated 3 years ago
- repo about binary exploitation☆12Dec 5, 2023Updated 2 years ago
- wannabe (up-to-date) 64bit port of lguest☆14May 11, 2011Updated 14 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- ☆10Jan 2, 2016Updated 10 years ago
- This is the gandcrab v5.0.3 javascript dropper☆10Apr 29, 2020Updated 5 years ago
- Cobalt Strike DNS beacon parser☆11Nov 29, 2021Updated 4 years ago
- Centos6/7一键清理内核☆10Mar 10, 2020Updated 5 years ago
- Learning assembly for linux-x86_64☆13Mar 18, 2016Updated 9 years ago
- Microbenchmarks for x86_64 kernel entry methods☆20Feb 21, 2022Updated 4 years ago
- Shadow Attack, LiRA, Quantile Regression and RMIA implementations in PyTorch (Online version)☆14Nov 8, 2024Updated last year
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- Data and structures regarding the research done on WdFilter☆12Apr 15, 2020Updated 5 years ago
- The malsource dataset☆12Aug 31, 2021Updated 4 years ago
- The ICS^2 Matrix is a threat taxonomy for Programmable Logic Controllers and Industrial Control Systems☆13Sep 10, 2024Updated last year
- QEMU escape code☆63Jun 6, 2021Updated 4 years ago
- ☆21Feb 10, 2026Updated 2 weeks ago
- qemu-system by docker-compose☆13Jun 14, 2022Updated 3 years ago
- ACI-GetStarted☆11Jun 4, 2025Updated 8 months ago
- Multi-algo CPUMiner☆13Apr 2, 2016Updated 9 years ago