Python and Machine Learning Workshop at Hack.lu 2017
☆82May 18, 2018Updated 7 years ago
Alternatives and similar repositories for hack_lu_2017
Users that are interested in hack_lu_2017 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- CVE-2017-8759 - A vulnerability in the SOAP WDSL parser.☆176Sep 14, 2017Updated 8 years ago
- Integration between MISP platform and McAfee MVISION EDR☆14Mar 14, 2022Updated 4 years ago
- Providing timelines based on OSINT Reports☆31Jun 21, 2023Updated 2 years ago
- Some sample code from my Zero Nights 2017 presentation.☆60Nov 19, 2017Updated 8 years ago
- FutureTrust analyzes electronic identification (eID) services in Europe and beyond. It is funded within the EU Framework Programme for Re…☆12Nov 16, 2022Updated 3 years ago
- Break Apps with Frida workshop material☆46Oct 17, 2017Updated 8 years ago
- ☆22Oct 13, 2017Updated 8 years ago
- yarning about data science for white hat security researchers☆118Oct 16, 2019Updated 6 years ago
- ☆91Jul 31, 2019Updated 6 years ago
- st2-046-poc CVE-2017-5638☆21Aug 17, 2018Updated 7 years ago
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 3 months ago
- Passive DNS server interface compliant to "Common Output Format"☆10Sep 19, 2016Updated 9 years ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Feb 26, 2026Updated 3 weeks ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- A script to track malware IOCs with OSINT on Twitter.☆54May 3, 2024Updated last year
- ☆14May 30, 2018Updated 7 years ago
- Simple yara decompiler☆17Apr 8, 2017Updated 8 years ago
- ProXBBE (Protocol eXtraction By Binary Execution)☆31Sep 21, 2017Updated 8 years ago
- CyCAT.org taxonomies☆15May 22, 2021Updated 4 years ago
- Automated handling of data feeds for security teams☆148Dec 31, 2025Updated 2 months ago
- a Malware/Threat Analyst Desktop☆89Aug 25, 2015Updated 10 years ago
- An IDA Pro Plugin for embedding an IPython Kernel☆64Oct 27, 2019Updated 6 years ago
- The Seeker of IOC☆131Oct 2, 2020Updated 5 years ago
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆147Jul 30, 2017Updated 8 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆120Nov 6, 2024Updated last year
- Symbol REPL☆31Mar 4, 2018Updated 8 years ago
- Collection of pin tools☆52Dec 29, 2015Updated 10 years ago
- DLL-injection based solution to Brecht Wyseur's wbDES challenge (based on SysK's Phrack article)☆43Nov 6, 2017Updated 8 years ago
- A Tool to Unpack Self-Modifying Code using DynamoRIO☆140Apr 17, 2017Updated 8 years ago
- ☆28Oct 16, 2017Updated 8 years ago
- ☆11Nov 6, 2018Updated 7 years ago
- My conference presentations and publications☆26Feb 24, 2022Updated 4 years ago
- map file generator for intel x86 binary based on flirt signature☆83May 2, 2016Updated 9 years ago
- ☆33Oct 25, 2016Updated 9 years ago
- flare-dbg is a project meant to aid malware reverse engineers in rapidly developing debugger scripts.☆149Oct 5, 2017Updated 8 years ago
- Scripts targeting specific families☆13Jul 3, 2017Updated 8 years ago
- A set of scripts for a radare-based malware code analysis workflow☆68Jan 10, 2019Updated 7 years ago
- rVMI - A New Paradigm For Full System Analysis☆359Oct 4, 2017Updated 8 years ago