penserbjorne's repositories
clase-computaciongrafica-2019-1
Proyecto final para la clase de Computación Gráfica, FI, UNAM, 2019-1
clase-reconocimiento-patrones-2020-1
Clase de "Reconocimiento de patrones" de la FI, UNAM, semestre 2020-1
clase-temas-selectos-de-sistemas-inteligentes-2020-1
Clase de "Temas Selectos de Sistemas Inteligentes" en la FI,UNAM, 2020-1
penserbjorne.github.io
Sitio web personal.
py-elotl
Paquete para python
APIT-2020-2
Repositorio para la materia Análisis y Procesamiento Inteligente de Textos.
clase-aprendizaje-maquina-2020-1
Clase de "Aprendizaje (Máquina)" en la FI,UNAM, 2020-1
clase-arquitectura-computadoras-2020-1
Clase de Arquitectura de Computadoras, FI, UNAM, 2020-1
clase-bases-de-datos-2020-2
Repositorio para la clase de Bases de Datos 2020-2, UNAM, FI. Con el poderosisimo profesor Jorge Alberto Campos.
clase-compiladores-2019-2
Ejercicios desarrollados para la clase de compiladores, FI UNAM 2019-2
clase-pln-2020-2
Clase de "Procesamiento de Lenguaje Natural" de la FI, UNAM, semestre 2020-2
iOS_sysdiagnose_forensic_scripts
Scripts to parse various iOS sysdiagnose logs. Based upon the forensic research of Mattia Epifani, Heather Mahalik and Cheeky4n6monkey.
license
Archive of all released versions of the MVT License.
MobileRobots-2020-2-for-Covid19
Alternative course for the Mobile Robots Course at FI, UNAM, 2020-2
mvt
MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.
mvt-androidqf
androidqf (Android Quick Forensics) helps quickly gathering forensic evidence from Android devices, in order to identify potential traces of compromise.
mvt-indicators
Index and collection of MVT compatibile indicators of compromise.
raytracing
Simple ray tracing program based in the book Ray tracing in a weekend
sysdiagnose
Forensic toolkit for iOS sysdiagnose feature
TinyCheck
TinyCheck allows you to easily capture network communications from a smartphone or any device which can be associated to a Wi-Fi access point in order to quickly analyze them. This can be used to check if any suspect or malicious communication is outgoing from a smartphone, by using heuristics or specific Indicators of Compromise (IoCs).