Pinned Repositories
ALERT
Official repository for the paper "ALERT: A Comprehensive Benchmark for Assessing Large Language Models’ Safety through Red Teaming"
append_signed_pe
Append custom data to signed pe file and DONOT DESTROY SIGNED STATUS.
AV_Detection_Dump
Antivirus Detection Name Dump
Awesome-Cybersecurity-Handbooks
A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.
DefenderPro
Huorong-ATP-Rules
一款火绒增强HIPS自定义规则
Huorong-HIPS-Rule-Schema
The project includes two json schemas of Huorong Host-based Intrusion Prevention System (HIPS) custom rule files (json). They can be used to validate Huorong HIPS rules and speed up editing.
JerryLinLinLin.github.io
My blog
SampleMailSubmitter
A tool for automatically sending suspicious/false-flag files via email to Antivirus vendors
VirusTotalSmartScanner
A Smart Anti-Virus Scanner Powered by Virus Total
JerryLinLinLin's Repositories
JerryLinLinLin/Huorong-ATP-Rules
一款火绒增强HIPS自定义规则
JerryLinLinLin/SampleMailSubmitter
A tool for automatically sending suspicious/false-flag files via email to Antivirus vendors
JerryLinLinLin/AV_Detection_Dump
Antivirus Detection Name Dump
JerryLinLinLin/VirusTotalSmartScanner
A Smart Anti-Virus Scanner Powered by Virus Total
JerryLinLinLin/Huorong-HIPS-Rule-Schema
The project includes two json schemas of Huorong Host-based Intrusion Prevention System (HIPS) custom rule files (json). They can be used to validate Huorong HIPS rules and speed up editing.
JerryLinLinLin/DefenderPro
JerryLinLinLin/JerryLinLinLin.github.io
My blog
JerryLinLinLin/ALERT
Official repository for the paper "ALERT: A Comprehensive Benchmark for Assessing Large Language Models’ Safety through Red Teaming"
JerryLinLinLin/append_signed_pe
Append custom data to signed pe file and DONOT DESTROY SIGNED STATUS.
JerryLinLinLin/Awesome-Cybersecurity-Handbooks
A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.
JerryLinLinLin/CyberBattleSim
An experimentation and research platform to investigate the interaction of automated agents in an abstract simulated network environments.
JerryLinLinLin/Dirty-Vanity
A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.html#dirty-vanity-a-new-approach-to-code-injection--edr-bypass-28417
JerryLinLinLin/drakvuf-sandbox
DRAKVUF Sandbox - automated hypervisor-level malware analysis system
JerryLinLinLin/dyninst
DyninstAPI: Tools for binary instrumentation, analysis, and modification.
JerryLinLinLin/ECE353-Final-Project-Sky-Fighter
JerryLinLinLin/EsetLogParser
Python script for parsing ESET (NOD32) virlog.dat file.
JerryLinLinLin/flare-vm
JerryLinLinLin/irma
IRMA is an asynchronous & customizable analysis system for suspicious files.
JerryLinLinLin/KaraOK
JerryLinLinLin/phantomstyle
Cross-platform QStyle for traditionalists
JerryLinLinLin/RaspberryPi-chan
Local Voice Assistant Running on Raspberry Pi
JerryLinLinLin/readthedoc-test
JerryLinLinLin/Scanners-Box
A powerful and open-source toolkit for hackers and security automation - 安全行业从业者自研开源扫描器合辑
JerryLinLinLin/SOREL-20M
Sophos-ReversingLabs 20 million sample dataset
JerryLinLinLin/spi
JerryLinLinLin/SupplyChainAttacks
JerryLinLinLin/Twitter-s-the-algorithm
Source code for Twitter's Recommendation Algorithm
JerryLinLinLin/Twitter-s-the-algorithm-ml
Source code for Twitter's Recommendation Algorithm
JerryLinLinLin/VMProtect
VMProtect source code leak (incomplete, some important files are still missing, but you can still see it as a reference on how to virtualize the code)
JerryLinLinLin/vmprotect-3.5.1