stephenJoester / fake_news_detectionLinks
☆10Updated last year
Alternatives and similar repositories for fake_news_detection
Users that are interested in fake_news_detection are comparing it to the libraries listed below
Sorting:
- Sản phẩm "Cờ Caro cổ điển" - Project 1☆1Updated last year
- National Graduation Exam Score from 2022 to 2024☆11Updated 10 months ago
- VinCSS Reverse Engineering, Malware Analysing Tools & Ultilities☆27Updated 3 years ago
- ☆2Updated 2 years ago
- Helpful WinDBG command for kernel debugging☆23Updated 4 years ago
- This exploit use PEB walk technique to resolve API calls dynamically, obfuscate all API calls to perform process injection.☆17Updated 10 months ago
- Writeups for CTF challenges☆31Updated last year
- ☆22Updated last year
- ☆17Updated 10 months ago
- Compile shellcode into an exe file from Windows or Linux.☆66Updated 4 years ago
- Reverse Engineering challenges☆33Updated 4 years ago
- Fuzzy search tool for IDA Pro (Update)☆11Updated last year
- ☆36Updated last year
- Simple Packer PE File☆15Updated 6 years ago
- A Python-based tool for analyzing IoT firmware, supporting both filesystem-based and RTOS-based (e.g. FreeRTOS, Zephyr) images. Features …☆19Updated last month
- Evasion Escaper is a project aimed at evading the checks that malicious software performs to detect if it's running in a virtual environm…☆106Updated 4 months ago
- UnpacMe IDA Byte Search☆28Updated last year
- Small tool to convert beteween the PE alignments (raw and virtual).☆89Updated 2 years ago
- This repo contains EXPs about Vulnerable Windows Driver☆45Updated last year
- windows rootkit☆60Updated last year
- OFFZONE 2024 Malware Persistence workshop☆19Updated 5 months ago
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆45Updated 4 years ago
- TrashDBG the world's worse debugger☆23Updated 3 years ago
- ☆25Updated 7 months ago
- simple user-mode Rootkit☆105Updated 2 years ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆116Updated 10 months ago
- Implementing the ghostly hollowing PE injection technique using tampered syscalls.☆156Updated 2 months ago
- Next gen process injection technique☆53Updated 4 years ago
- Dont Call Me Back - Dynamic kernel callback resolver. Scan kernel callbacks in your system in a matter of seconds!☆232Updated 10 months ago
- Malware?☆70Updated 7 months ago