Saket Upadhyay (Saket-Upadhyay)

Saket-Upadhyay

Geek Repo

Company:University of Virginia

Location:United States

Home Page:http://saketupadhyay.com

Twitter:@saketofcyber

Github PK Tool:Github PK Tool


Organizations
comparchsa
FeatherCTF

Saket Upadhyay's starred repositories

metasploit-framework

Metasploit Framework

Language:RubyLicense:NOASSERTIONStargazers:33955Issues:2049Issues:6058

carla

Open-source simulator for autonomous driving research.

GTFOBins.github.io

GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems

Language:HTMLLicense:GPL-3.0Stargazers:10744Issues:144Issues:47

movfuscator

The single instruction C compiler

Language:CLicense:NOASSERTIONStargazers:9395Issues:206Issues:40

public-pentesting-reports

A list of public penetration test reports published by several consulting firms and academic security groups.

pwnagotchi

(⌐■_■) - Deep Reinforcement Learning instrumenting bettercap for WiFi pwning.

Language:PythonLicense:NOASSERTIONStargazers:7650Issues:240Issues:666

awesome-ml-for-cybersecurity

:octocat: Machine Learning for Cyber Security

caldera

Automated Adversary Emulation Platform

Language:PythonLicense:Apache-2.0Stargazers:5563Issues:167Issues:765

meltdown

This repository contains several applications, demonstrating the Meltdown bug.

Language:CLicense:ZlibStargazers:4111Issues:152Issues:0

Triton

Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software verification or just emulate code.

Language:C++License:Apache-2.0Stargazers:3504Issues:135Issues:961

OpenSK

OpenSK is an open-source implementation for security keys written in Rust that supports both FIDO U2F and FIDO2 standards.

Language:RustLicense:Apache-2.0Stargazers:2985Issues:88Issues:192

AarogyaSetu_Android

Aarogya Setu Android app native code

Language:JavaLicense:NOASSERTIONStargazers:2883Issues:141Issues:388

CleverAlgorithms

Clever Algorithms: Nature-Inspired Programming Recipes

Language:TeXStargazers:2037Issues:110Issues:0

malware-samples

Malware samples, analysis exercises and other interesting resources.

Language:HTMLStargazers:1468Issues:89Issues:0

REpsych

Psychological warfare in reverse engineering

Language:AssemblyLicense:BSD-3-ClauseStargazers:960Issues:33Issues:1

drltrace

Drltrace is a library calls tracer for Windows and Linux applications.

Language:HTMLLicense:BSD-3-ClauseStargazers:388Issues:28Issues:27

AndroidMalware_2020

Popular Android malware seen in 2020

PyIATRebuild

Automatically rebuild Import Address Table for dumped PE file. With python bindings!

ClaMP

A Malware classifier dataset built with header fields’ values of Portable Executable files

KAPA

Artificial Immune System algorithm using clonal selection

Language:PythonStargazers:16Issues:3Issues:0

clonalg

Clonal Selection Algorithm in Python/Jupyter

Language:Jupyter NotebookLicense:Apache-2.0Stargazers:15Issues:2Issues:0

MEML

Resource-aware MQTT-based Machine Learning for Network Attacks Detection on IoT Edge Devices. Proof-of-concept demonstration for Arduino UNO v3, Orange Pi Zero

Language:C++License:LGPL-3.0Stargazers:5Issues:1Issues:0

LiveLocationTriangulation

Android Application to Trace user movements on Google satellite map, using polygraph lines.

Language:JavaLicense:MITStargazers:1Issues:0Issues:0

Talks-and-Presentation

"Things" I use(d) in my talks and presentaions.

Language:PythonStargazers:0Issues:1Issues:0