Highlights
- Pro
Lists (2)
Sort Name ascending (A-Z)
Stars
A cross-platform tool to work with Security Identifiers (SID) formats.
APT Malware Dataset Containing over 3,500 State-Sponsored Malware Samples
Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches).
DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic
Damn Vulnerable Restaurant is an intentionally vulnerable Web API game for learning and training purposes dedicated to developers, ethical hackers and security engineers.
Parse MITRE ATT&CK to markdown for Obsidian
Packet captures of malicious traffic for analysis using Wireshark
A python script to dump all the challenges locally of a CTFd-based Capture the Flag.
Template LaTeX de rapports de projets / TDs et stages (ST05,ST09,ST10,ST30) pour l'Université de Technologie de Troyes aka UTT (école d'ingénieur).
A Python implementation of the Wiener attack on RSA public-key encryption scheme.
CTFNote is a collaborative tool aiming to help CTF teams to organise their work.