Saastha Vasan (saasthavasan)

saasthavasan

Geek Repo

Location:Santa Barbara, California

Home Page:beingmalicious.wordpress.com

Github PK Tool:Github PK Tool

Saastha Vasan 's starred repositories

Awesome-Hacking

A collection of various awesome lists for hackers, pentesters and security researchers

License:CC0-1.0Stargazers:81877Issues:3823Issues:0

PHP-Parser

A PHP parser written in PHP

Language:PHPLicense:BSD-3-ClauseStargazers:16922Issues:231Issues:604

theZoo

A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.

Language:PythonLicense:NOASSERTIONStargazers:11068Issues:809Issues:154

al-khaser

Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.

Language:C++License:GPL-2.0Stargazers:5750Issues:240Issues:101

awesome-reverse-engineering

Reverse Engineering Resources About All Platforms(Windows/Linux/macOS/Android/iOS/IoT) And Every Aspect! (More than 3500 open source tools and 2300 posts&videos)

best_AI_papers_2021

A curated list of the latest breakthroughs in AI (in 2021) by release date with a clear video explanation, link to a more in-depth article, and code.

License:MITStargazers:2910Issues:84Issues:0

ReflectiveDLLInjection

Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loading of a library from memory into a host process.

Language:CLicense:BSD-3-ClauseStargazers:2671Issues:127Issues:15

zotero-night

Night theme for Zotero UI and PDF

Language:SCSSLicense:GPL-3.0Stargazers:2351Issues:12Issues:155

Crypton

Library consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key Exchange, Authentication methods along with example challenges from CTFs

Language:PythonLicense:MITStargazers:1456Issues:59Issues:3

Awesome-Advanced-Windows-Exploitation-References

List of Awesome Advanced Windows Exploitation References

malboxes

Builds malware analysis Windows VMs so that you don't have to.

Language:PythonLicense:GPL-3.0Stargazers:1028Issues:68Issues:81

Manalyze

A static analyzer for PE executables.

Language:YARALicense:GPL-3.0Stargazers:1006Issues:64Issues:47
Language:PythonLicense:GPL-3.0Stargazers:936Issues:18Issues:7

attention-networks-for-classification

Hierarchical Attention Networks for Document Classification in PyTorch

Language:Jupyter NotebookStargazers:603Issues:25Issues:18

morris-worm

The decompiled Morris Worm source code

almost-sinatra

Sinatra refactored, only six lines now. More popular than a pair of socks.

Language:RubyLicense:NOASSERTIONStargazers:519Issues:17Issues:4

Hierarchical-attention-networks-pytorch

Hierarchical Attention Networks for document classification

Windows-API-Hashing

This is a simple example and explanation of obfuscating API resolution via hashing

shellcode_tools

Miscellaneous tools written in Python, mostly centered around shellcodes.

FinSpy-Dokumentation

CCC: Analyse des Staatstrojaners "FinSpy" für Android

checkpot

Checkpot Honeypot Checker

Language:PythonLicense:NOASSERTIONStargazers:44Issues:8Issues:1

Forecast

Forecasting Malware Capabilities From Cyber Attack Memory Images

Language:PythonStargazers:30Issues:2Issues:0

ctf

ctf writeups

Language:PythonStargazers:18Issues:2Issues:0

ida-scripts

Dumping ground for whatever IDA Pro scripts I write

Language:PythonLicense:UnlicenseStargazers:15Issues:4Issues:0
Language:HTMLStargazers:3Issues:0Issues:0