canaankao's repositories
al-khaser
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
archive
Linux.cn Archive
awesome-endpoint-detection-and-response
Collection of tool you need to have in your Endpoint Detection and Response arsenal
awesome-scalability
The Patterns of Scalable, Reliable, and Performant Large-Scale Systems
capa-rules
Standard collection of rules for capa: the tool for enumerating the capabilities of programs
capstone
Capstone disassembly/disassembler framework for ARM, ARM64 (ARMv8), BPF, Ethereum VM, M68K, M680X, Mips, MOS65XX, PPC, RISC-V(rv32G/rv64G), SH, Sparc, SystemZ, TMS320C64X, TriCore, Webassembly, XCore and X86.
cloc
cloc counts blank lines, comment lines, and physical lines of source code in many programming languages.
cve-bin-tool
The CVE Binary Tool helps you determine if your system includes known vulnerabilities. You can scan binaries for over 200 common, vulnerable components (openssl, libpng, libxml2, expat and others), or if you know the components used, you can get a list of known vulnerabilities associated with an SBOM or a list of components and versions.
EDR-Telemetry
This project aims to compare and evaluate the telemetry of various EDR products.
EDRSilencer
A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the server.
firejail
Linux namespaces and seccomp-bpf sandbox
hacktricks
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
Havoc
The Havoc Framework.
injdrv
proof-of-concept Windows Driver for injecting DLL into user-mode processes using APC
InternLM
InternLM has open-sourced a 7 and 20 billion parameter base models and chat models tailored for practical scenarios and the training system.
llm-course
Course to get into Large Language Models (LLMs) with roadmaps and Colab notebooks.
llm.c
LLM training in simple, raw C/CUDA
mal_unpack
Dynamic unpacker based on PE-sieve
maltrail
Malicious traffic detection system
oletools
oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware analysis, forensics and debugging.
Perplexica
Perplexica is an AI-powered search engine. It is an Open source alternative to Perplexity AI
PingRAT
PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.
reversinglabs-yara-rules
ReversingLabs YARA Rules
SharpHound
C# Data Collector for BloodHound
smda
SMDA is a minimalist recursive disassembler library that is optimized for accurate Control Flow Graph (CFG) recovery from memory dumps.
SSLproxy
Transparent SSL/TLS proxy for decrypting and diverting network traffic to other programs, such as UTM services, for deep SSL inspection
TCM-Ancient-Books
中医药古籍文本,近700项
turto
turto is a simple and easy-to-use Discord music bot that supports customization
ultralytics
NEW - YOLOv8 🚀 in PyTorch > ONNX > OpenVINO > CoreML > TFLite