Git Product home page Git Product logo

Olivier Houte's Projects

beeswithmachineguns icon beeswithmachineguns

A utility for arming (creating) many bees (micro EC2 instances) to attack (load test) targets (web applications).

beets icon beets

music library manager and MusicBrainz tagger

belati icon belati

The Traditional Swiss Army Knife for OSINT

beleth icon beleth

Multi-threaded SSH Password Auditor

bella icon bella

A pure python, post-exploitation, data mining tool and remote administration tool for macOS.

bert icon bert

TensorFlow code and pre-trained models for BERT

best-of-ml-python icon best-of-ml-python

🏆 A ranked list of awesome machine learning Python libraries. Updated weekly.

bettercap icon bettercap

A complete, modular, portable and easily extensible MITM framework.

bettercap-1 icon bettercap-1

The Swiss Army knife for 802.11, BLE and Ethernet networks reconnaissance and attacks.

beurk icon beurk

BEURK Experimental Unix RootKit

bexes icon bexes

Bruteforce Executable Files Switchs

bgp-ranking icon bgp-ranking

For an Internet Service Provider, AS numbers are a logical representation of the other ISP peering or communicating with his autonomous system. ISP customers are using the capacity of the Internet Service Provider to reach Internet services over other AS. Some of those communications can be malicious (e.g. due to malware activities on an end-user equipments) and hosted at specific AS location. In order to provide an improved security view on those AS numbers, a trust ranking scheme will be implemented based on existing dataset of compromised systems, malware C&C IP and existing datasets of the ISPs.

big-list-of-naughty-strings icon big-list-of-naughty-strings

The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.

bigipsecurity icon bigipsecurity

This document describes common misconfigurations of F5 Networks BigIP systems.

binaryalert icon binaryalert

BinaryAlert: Serverless, Real-time & Retroactive Malware Detection

binarynet icon binarynet

Training Deep Neural Networks with Weights and Activations Constrained to +1 or -1

binch icon binch

A light ELF binary patch tool in python urwid

binexport icon binexport

An IDA Pro plugin for exporting disassemblies into BinNavi databases and to Protocol Buffers

binglide icon binglide

Visual reverse engineering tool showing some of the current techniques.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.