Git Product home page Git Product logo

4sp1r3's Projects

lpthw-study-projects icon lpthw-study-projects

A collection of small study projects for after LPTHW which teaches basic systems coding in Python.

machineid icon machineid

Get the unique machine id of any host (without admin privileges)

machinelearning icon machinelearning

POC IDS anomaly detection engine built with iPython notebook, matplotlib, pandas, numpy, scikit-learn, d3.js, hyperloglog implementation, PYCON 2013 Intro and Advanced Machine Learning Tutorial Notebooks

magpie icon magpie

Magpie contains a number of scripts for running Big Data software in HPC environments. Including Hadoop, Spark, Hbase, Storm, and other packages. It currently supports running over the parallel file system Lustre and running over any generic network filesytem. There is scheduler/resource manager support for Slurm, Moab, Torque. and LSF.

maildb icon maildb

Python Web App to Parse and Track Email and http Pcap Files.

mailspy icon mailspy

Catch IMAP/POP passwords and see incoming and outgoing messages

mailtojson icon mailtojson

Small python script to parse incoming mail to JSON and POST it to a remote url (callback).

mal-dnssearch icon mal-dnssearch

Compare multiple log formats against malware reputation lists.

malcolm icon malcolm

Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files) and Zeek logs.

maltego-mvs icon maltego-mvs

Tools to combine MVS data with external sources and visualise the output in Maltego.

maltrieve icon maltrieve

A tool to retrieve malware directly from the source for security researchers.

mana icon mana

Our mana toolkit for wifi rogue AP attacks and MitM - see hostapd-mana too

material icon material

Ligas a material interesante para apoyar el curso de IA

mean-vagrant icon mean-vagrant

Vagrant Development Environment for Kick-Starting Developing an application in the MEAN Stack.

meterssh icon meterssh

MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communications as a normal SSH connection. The way it works is by injecting shellcode into memory, then wrapping a port spawned (meterpeter in this case) by the shellcode over SSH back to the attackers machine. Then connecting with meterpreter's listener to localhost will communicate through the SSH proxy, to the victim through the SSH tunnel. All communications are relayed through the SSH tunnel and not through the network.

mhn icon mhn

Modern Honey Network

mnml icon mnml

A lightweight Python web framework

modsec-sdbm-util icon modsec-sdbm-util

Utility to manipulate SDBM files used by ModSecurity. With that utility it is possible to _shrink_ SDBM databases. It is also possible to list the SDBM contents with filters such as: expired or invalid items only.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.