py2n's repositories

Awesome-Vulnerability-Research

🦄 A curated list of the awesome resources about the Vulnerability Research

License:NOASSERTIONStargazers:0Issues:2Issues:0

BinarySearch

binary search

License:GPL-2.0Stargazers:0Issues:2Issues:0

byob

BYOB (Build Your Own Botnet)

Language:PythonLicense:GPL-3.0Stargazers:0Issues:0Issues:0

chimera_loader

ChimeraPE (a PE injector type - alternative to: RunPE, ReflectiveLoader, etc)

Language:CStargazers:0Issues:2Issues:0

CircularPicker

thermostat

Language:JavaStargazers:0Issues:2Issues:0

Controller_keys

Controller_keys

Language:JavaStargazers:0Issues:2Issues:0

crypto_utils

Set of my small utils related to cryptography, encoding, decoding etc

Language:PythonStargazers:0Issues:2Issues:0

deep-face-recognition

One-shot Learning and deep face recognition notebooks and workshop materials

Language:Jupyter NotebookStargazers:0Issues:1Issues:0

DeepSpeech

A TensorFlow implementation of Baidu's DeepSpeech architecture

Language:PythonLicense:MPL-2.0Stargazers:0Issues:2Issues:0

demos

Demos of various injection techniques found in malware

Language:CStargazers:0Issues:2Issues:0

encryptor

initial commit

Language:JavaStargazers:0Issues:2Issues:0

Examples

A collection of TLA+ specifications of varying complexities

Language:TLALicense:NOASSERTIONStargazers:0Issues:0Issues:0
Language:PromelaStargazers:0Issues:1Issues:0

hexo

A clean hexo install. Hexo is a fast, simple & powerful blog framework, powered by Node.js

Language:CSSStargazers:0Issues:2Issues:0

LinearSearchTime

linear search

Stargazers:0Issues:2Issues:0

malware_analysis

Various snippets created during malware analysis

Language:PythonStargazers:0Issues:2Issues:0

middleman

A clean Middleman install. Middleman is a static site generator using all the shortcuts and tools in modern web development.

Language:RubyStargazers:0Issues:2Issues:0
Language:TLAStargazers:0Issues:1Issues:0

MyApplication-salam

say-hello-to-allah

Language:JavaStargazers:0Issues:2Issues:0

Optimal_Binary_Search_Tree

create an optimal binary search tree using dynamic programming and then show the tree

Language:CStargazers:0Issues:2Issues:0

pe-sieve

a small tool for investigating inline hooks (and other in-memory code patches)

Language:CLicense:BSD-2-ClauseStargazers:0Issues:2Issues:0

process_chameleon

A process overwriting its own PEB to make an illusion that it has been loaded from a different path.

Language:CStargazers:0Issues:2Issues:0

process_doppelganging

My implementation of enSilo's Process Doppelganging (PE injection technique)

Language:CStargazers:0Issues:2Issues:0

reverse-engineering-reference-manual

Here is a collage of reverse engineering topics that I find interesting

Stargazers:0Issues:2Issues:0

salam

initial project

Language:JavaStargazers:0Issues:2Issues:0

signature-base

Signature base for my scanner tools

Language:YARALicense:NOASSERTIONStargazers:0Issues:0Issues:0

tsunami-security-scanner

Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence.

Language:JavaLicense:Apache-2.0Stargazers:0Issues:0Issues:0

Veil

Veil 3.0

Language:PythonLicense:GPL-3.0Stargazers:0Issues:2Issues:0

webdriver-rust

Library implementing the wire protocol for the W3C WebDriver standard.

Language:RustLicense:MPL-2.0Stargazers:0Issues:2Issues:0

wickr-crypto-c

An implementation of the Wickr Secure Messaging Protocol in C

Language:CLicense:NOASSERTIONStargazers:0Issues:2Issues:0