Python and Machine Learning Workshop at Hack.lu 2017
☆82May 18, 2018Updated 7 years ago
Alternatives and similar repositories for hack_lu_2017
Users that are interested in hack_lu_2017 are comparing it to the libraries listed below
Sorting:
- Integration between MISP platform and McAfee MVISION EDR☆14Mar 14, 2022Updated 3 years ago
- st2-046-poc CVE-2017-5638☆21Aug 17, 2018Updated 7 years ago
- yarning about data science for white hat security researchers☆118Oct 16, 2019Updated 6 years ago
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- CVE-2017-8759 - A vulnerability in the SOAP WDSL parser.☆176Sep 14, 2017Updated 8 years ago
- ☆22Oct 13, 2017Updated 8 years ago
- Some sample code from my Zero Nights 2017 presentation.☆60Nov 19, 2017Updated 8 years ago
- Break Apps with Frida workshop material☆46Oct 17, 2017Updated 8 years ago
- Providing timelines based on OSINT Reports☆31Jun 21, 2023Updated 2 years ago
- ☆91Jul 31, 2019Updated 6 years ago
- ☆14May 30, 2018Updated 7 years ago
- Help fuzz various protocols and waits for ping backs Integrates LDAP server and JNDI payload☆11Dec 27, 2021Updated 4 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- BlackHat Europe 2017 Slides☆25Feb 15, 2018Updated 8 years ago
- The Seeker of IOC☆131Oct 2, 2020Updated 5 years ago
- CVE-2017-0213 for command line☆58Jul 1, 2017Updated 8 years ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated this week
- A Rekall interactive document for a Memory Analysis workshop/course.☆43Mar 8, 2017Updated 8 years ago
- An IDA Pro Plugin for embedding an IPython Kernel☆64Oct 27, 2019Updated 6 years ago
- Automated handling of data feeds for security teams☆147Dec 31, 2025Updated 2 months ago
- Symbol REPL☆31Mar 4, 2018Updated 7 years ago
- st2-048☆40Jul 7, 2017Updated 8 years ago
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Mar 27, 2017Updated 8 years ago
- CyCAT.org taxonomies☆15May 22, 2021Updated 4 years ago
- ☆16Aug 11, 2017Updated 8 years ago
- ☆20Oct 22, 2019Updated 6 years ago
- A Tool to Unpack Self-Modifying Code using DynamoRIO☆140Apr 17, 2017Updated 8 years ago
- POC and exploitation of vulnerabilities☆91Mar 22, 2022Updated 3 years ago
- Intercept arbitrary functions at run-time, without knowing their typedefs☆88Apr 13, 2017Updated 8 years ago
- static program analysis tool that generates return-oriented exploits for ELF binaries☆44Feb 9, 2018Updated 8 years ago
- map file generator for intel x86 binary based on flirt signature☆83May 2, 2016Updated 9 years ago
- Web interface for the Volatility Memory Forensics Framework☆260Nov 21, 2017Updated 8 years ago
- A script to track malware IOCs with OSINT on Twitter.☆54May 3, 2024Updated last year
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆148Jul 30, 2017Updated 8 years ago
- BTG's purpose is to make fast and efficient search on IOC☆71Nov 27, 2018Updated 7 years ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆197Sep 12, 2017Updated 8 years ago
- a Malware/Threat Analyst Desktop☆89Aug 25, 2015Updated 10 years ago
- This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https://embedi.com/blog/skeleton-closet-ms-office…☆97Nov 21, 2017Updated 8 years ago
- Fetch and set configuration values for IDA Plugins☆25Nov 26, 2025Updated 3 months ago