utwente-scs / misdet-codeView external linksLinks
☆16Sep 12, 2022Updated 3 years ago
Alternatives and similar repositories for misdet-code
Users that are interested in misdet-code are comparing it to the libraries listed below
Sorting:
- A massive collection of Cybersecurity papers, guides and reports.☆10Jan 3, 2025Updated last year
- An interactive, TLS-capable HTTP intercepting proxy designed for penetration testers and software developers, including a parser for the …☆21Jul 31, 2025Updated 6 months ago
- Tool to check the CloudTrail configuration and the services where trails are sent, to detect potential attacks to CloudTrail logging.☆13May 25, 2024Updated last year
- Challenge 1 of The Auror Project - Setup AD Lab automatically☆12Apr 26, 2022Updated 3 years ago
- Make Maven Turbo fast 🏎️☆21Jan 21, 2026Updated 3 weeks ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆25Jun 11, 2025Updated 8 months ago
- Malware dev tricks. Syscalls part 1. Simple C example☆10Jun 8, 2023Updated 2 years ago
- GraphCNN + LSTM for city-level parking prediction☆10Apr 21, 2019Updated 6 years ago
- A distributed experimentation platform using kubernetes.☆13Apr 20, 2021Updated 4 years ago
- Crossplane Provider for Styra☆14Dec 16, 2022Updated 3 years ago
- A small Python wrapper to setup, run, manage, and monitor experiments based on Caffe.☆10Aug 30, 2022Updated 3 years ago
- ☆10Dec 13, 2018Updated 7 years ago
- ☆11Dec 17, 2024Updated last year
- reinforcement learning for optimal debt collection strategy☆11Dec 8, 2019Updated 6 years ago
- 3D reconstruction of a textured object on an iOS device☆12Dec 10, 2016Updated 9 years ago
- Prototype compiler from AWS CloudFormation IaC templates into Logic.☆13Dec 5, 2023Updated 2 years ago
- Evil maid attacks are the biggest threat to full disk encryption, if you can't provide 100% physical security. It's not about locking you…☆11Sep 4, 2016Updated 9 years ago
- Pollard Rho attack on ECDLP with GMP☆10Sep 6, 2022Updated 3 years ago
- Common weakness enumeration library for Python (maintained fork of https://github.com/Julian-Nash/cwe )☆15Aug 29, 2024Updated last year
- Insecure web application used to test system security controls☆13Oct 14, 2025Updated 3 months ago
- ☆11Mar 5, 2023Updated 2 years ago
- Tools for geospatial analysis of radar rainfall fields☆12Nov 30, 2016Updated 9 years ago
- A greybox fuzzer for continuous integration☆10Dec 15, 2023Updated 2 years ago
- ☆10Mar 31, 2016Updated 9 years ago
- Project to Support The Hunter's Framework (THF)☆11Apr 16, 2024Updated last year
- ☆12May 6, 2021Updated 4 years ago
- MS Graph Commands and Tools for Blue Teamers☆52Feb 4, 2026Updated last week
- ☆14Sep 26, 2023Updated 2 years ago
- Implementation Code of TextHoaxer☆15Aug 21, 2022Updated 3 years ago
- ☆19Updated this week
- ☆15May 22, 2023Updated 2 years ago
- Python API for downloading and managing data. Checkout the documentation at:☆14Apr 29, 2019Updated 6 years ago
- Zero dependency browser extension for handling import of cookies, Microsoft 365 OAuth tokens, and Graph API interactions.☆22Dec 31, 2025Updated last month
- Demo project for authentication WebSocket handshakes.☆12Mar 11, 2023Updated 2 years ago
- STOchastic Rainstorm Model (STORM)☆12Oct 3, 2021Updated 4 years ago
- Obtenga el tipo de cambio del dólar del web service del Banco Central de Costa Rica.☆13Apr 8, 2022Updated 3 years ago
- Python utilities for computing properties of ocean waves☆12Jan 7, 2022Updated 4 years ago
- sKaleQL is an opinionated template repository for managing, executing, and organizing Kusto Query Language (KQL) queries against Azure Lo…☆19May 20, 2025Updated 8 months ago
- Open SAMMY codebase☆22Feb 3, 2026Updated last week