Git Product home page Git Product logo

mediumdragon's Projects

bindrill icon bindrill

Binary Driller (BD) is a visualization tool which uses the data produced from the Troglodyte tool developed on the Deep Learning Malware project. Binary Driller performs function matching using the provided function embeddings (function representations), then displays the matches for each function in a layout that mimics the location of each functi

botnets icon botnets

This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY

cardscan4linux icon cardscan4linux

Use this script to search through locally stored files for any Credit/Debit card details.

cybersecurity-box icon cybersecurity-box

Firewall-System based on OpenWRT or Pi-Hole with UnBound, TOR, optional Privoxy, opt. ntopng and opt. Configuration of the AVM FRITZ!Box with Presets for Security and Port-List. Please visit:

dart icon dart

The purpose of this code is to disassemble potentially malicious code into benign pieces that can safely be transported via any number of traditional methods without fear of infection.

deepfacelab icon deepfacelab

DeepFaceLab is the leading software for creating deepfakes.

deepnude-an-image-to-image-technology icon deepnude-an-image-to-image-technology

DeepNude's algorithm and general image generation theory and practice research, including pix2pix, CycleGAN, UGATIT, DCGAN, SinGAN, ALAE, mGANprior, StarGAN-v2 and VAE models (TensorFlow2 implementation). DeepNude的算法以及通用生成对抗网络(GAN,Generative Adversarial Network)图像生成的理论与实践研究。

dr0p1t-framework icon dr0p1t-framework

A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks

emv icon emv

Exploit, Malware and Vulnerability Scoring Application

fcl icon fcl

FCL (Fileless Command Lines) - Known command lines of fileless malicious executions

fidl icon fidl

A sane API for IDA Pro's decompiler. Useful for malware RE and vulnerability research

fireelf icon fireelf

fireELF - Fileless Linux Malware Framework

ghost icon ghost

:ghost: RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware

gozi icon gozi

Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.

hacktheworld icon hacktheworld

An Python Script For Generating Payloads that Bypasses All Antivirus so far .

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.