Eagainn's Stars
mwaskom/seaborn
Statistical data visualization in Python
CERT-W/certitude
The Seeker of IOC
ayoubfaouzi/al-khaser
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
JonathanSalwan/Triton
Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software verification or just emulate code.
radareorg/radare2
UNIX-like reverse engineering framework and command-line toolset
google/grr-doc
Documentation for the GRR Rapid Reponse framework