☆14Dec 22, 2015Updated 10 years ago
Alternatives and similar repositories for polygraph
Users that are interested in polygraph are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Expected edit distance implementation using OpenFst tools☆11May 13, 2015Updated 10 years ago
- ☆11Sep 6, 2019Updated 6 years ago
- Ruby - pwn tools☆11Nov 7, 2015Updated 10 years ago
- A python layer to interface with several SMTLIBv2 enabled SMT solvers☆16Apr 22, 2015Updated 10 years ago
- TF-IDF with Spark for the Kaggle popcorn competition☆10Jul 1, 2015Updated 10 years ago
- How to write basic memory corruption exploits on Windows☆28Sep 14, 2016Updated 9 years ago
- Archive Mirror for recently republished PoC/Exploit code☆17Nov 26, 2017Updated 8 years ago
- IoT CVEs as abnormal events to evaluate a real-time host-based IDS. https://doi.org/10.1016/j.future.2022.03.001☆13Mar 16, 2022Updated 4 years ago
- Docker files for Miasm☆17Apr 27, 2018Updated 7 years ago
- Python wrapper for the Java-based Maximal Information-based Nonparametric Exploration (MINE) statistics library☆19Feb 3, 2012Updated 14 years ago
- CVE-2013-6282 exploit☆27Nov 18, 2013Updated 12 years ago
- [ICCV 2021] Multimodal Knowledge Expansion☆10Aug 28, 2021Updated 4 years ago
- The dataset was used as a support to attack obfuscations. It is the largest obfuscated dataset, with realistic and various binaries and f…☆19Jan 15, 2026Updated 2 months ago
- Collect iftop metrics and send them via telegraf format (and then import them how you like)☆12Aug 9, 2022Updated 3 years ago
- ☆10Feb 10, 2020Updated 6 years ago
- A Mahjong game written in Python using the PyGame library.☆16Mar 24, 2020Updated 6 years ago
- Code for Mateen: Adaptive Ensemble Learning for Network Anomaly Detection☆17Feb 27, 2025Updated last year
- A regularized version of RBM for unsupervised feature selection.☆13Nov 20, 2019Updated 6 years ago
- Exercises for practicing MLSec for Systems Security☆10Sep 2, 2024Updated last year
- Django client for CloudMailin incoming email service☆11Mar 1, 2011Updated 15 years ago
- Knowledge Graph Embeddings (KGE) to implement Explainable Artificial Intelligence. As AI develops users must know how algorithms make the…☆11Jan 17, 2021Updated 5 years ago
- Generates a change log between different aosp tags. Based on the wonderful work of @alsutton☆15Feb 10, 2022Updated 4 years ago
- Fork of http://compcert.inria.fr/☆22Oct 30, 2014Updated 11 years ago
- Synthesizing Framework Models for Symbolic Execution☆15Sep 15, 2016Updated 9 years ago
- Open-source, enterprise-grade threat modeling platform☆32Updated this week
- Dynamic Symbolic Execution of Android Apps☆24Jan 16, 2016Updated 10 years ago
- A low-cost remote vital signs monitor for home patients☆12Feb 19, 2026Updated last month
- An automated firmware analysis tool based on Firmadyne (https://github.com/firmadyne/firmadyne)☆24Jul 8, 2017Updated 8 years ago
- Opensource repository for DVID V2☆16Jun 3, 2025Updated 9 months ago
- IDA loader plugin for Qualcomm Bootloader Stages☆40Jan 23, 2014Updated 12 years ago
- Backport of PEP 562☆14May 21, 2021Updated 4 years ago
- A tool which performs Sentiment Analysis on Facebook posts by using Datumbox API.☆23Jun 19, 2017Updated 8 years ago
- libpcap implementation for Julia language☆20Oct 27, 2025Updated 4 months ago
- A tool to cluster similar executables (PEs, DEXs, and etc), extract common signature, and generate Yara patterns for malware detection.☆26Jan 5, 2019Updated 7 years ago
- Gitignore plugin for Sublime Text 2 and 3☆12Aug 6, 2020Updated 5 years ago
- Telegram bot for assembling and disassembling on-the-go.☆21Sep 20, 2022Updated 3 years ago
- ☆18Apr 19, 2021Updated 4 years ago
- Threat Modeling with ATT&CK defines how to integreate MITRE ATT&CK® into your organization’s existing threat modeling methodology.☆12May 28, 2025Updated 9 months ago
- SublimeText plugin to diff your clipboard against the current selection☆12Sep 28, 2016Updated 9 years ago