wafs / edX--6.00.1x-CompSci-2013
MITx: 6.00.1x Introduction to Computer Science and Programming. -- This repo is full of my solutions to the problems. Still new to CompSci / Python, feel free to suggest anything better if I'm doing something wrong.
☆8Updated 11 years ago
Related projects ⓘ
Alternatives and complementary repositories for edX--6.00.1x-CompSci-2013
- Penguin OS Forensic (or Flight) Recorder☆37Updated 3 months ago
- A collection of tools adversaries commonly use in an attack.☆14Updated last month
- Simplified NAT Slipstream server and client☆20Updated 3 years ago
- Indicators of Normality☆12Updated 2 years ago
- A collection of personal ZAP scripts☆13Updated last year
- A few quick recipes for those that do not have much time during the day☆21Updated 2 weeks ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 4 years ago
- Queries for parsed spotlight database in sqlite☆11Updated 3 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆16Updated 3 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- Automated Static Analysis Framework☆10Updated 2 years ago
- Standardizing Security Titles☆13Updated last year
- Hashes of infamous malware☆25Updated last year
- Spins up a docker container with several useful tools for offensive security in macOS/cloud environments. Also installs the needed depend…☆16Updated 3 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆38Updated last year
- Repository to provide files related to our blog articles.☆15Updated 8 months ago
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆18Updated 2 years ago
- Sp00fer blog post -☆25Updated 2 years ago
- This repository contains sample log data that were collected after running adversary simulations in Microsoft 365☆20Updated last month
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 4 years ago
- Forensic Imaging quickstarts!☆13Updated 2 years ago
- A Proof-of-Concept Layer 2 Denial of Service Attack that disrupts low level operations of Programmable Logic Controllers within industria…☆31Updated 2 years ago
- Phishing sites configured to work with Netlify form handling☆12Updated 5 years ago
- A happy place for detection engineers, purple teamers and threat hunters focusing on macOS.☆20Updated 2 years ago
- Extract endpoints from specific Git repository for fuzzing☆21Updated 4 years ago
- A Burp extension to enable modification of FIX messages when relayed from MitM_Relay☆12Updated last year
- ☆15Updated 2 years ago
- Windows Security Logging☆43Updated 2 years ago
- psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., re…☆18Updated 4 years ago