Pinned Repositories
CEHv10StudyGuide
Study Guide for the CEH v10
codeql-uboot
joy
A package for capturing and analyzing network flow data and intraflow data, for network research, forensics, and security monitoring.
RetroPie-Setup
Shell script to set up a Raspberry Pi/Odroid/PC with RetroArch emulator and various cores
sample-java-programs
Sample Java programs to demonstrate performance issues
security
Stuff about it-security that might be good to know
ThreatPursuit-VM
Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysis and hunting designed for intel and malware analysts as well as threat hunters to get up and running quickly.
wifiphisher
The Rogue Access Point Framework
wifiphisher
The Rogue Access Point Framework
Tsirantonakis's Repositories
Tsirantonakis/CEHv10StudyGuide
Study Guide for the CEH v10
Tsirantonakis/codeql-uboot
Tsirantonakis/joy
A package for capturing and analyzing network flow data and intraflow data, for network research, forensics, and security monitoring.
Tsirantonakis/RetroPie-Setup
Shell script to set up a Raspberry Pi/Odroid/PC with RetroArch emulator and various cores
Tsirantonakis/sample-java-programs
Sample Java programs to demonstrate performance issues
Tsirantonakis/security
Stuff about it-security that might be good to know
Tsirantonakis/ThreatPursuit-VM
Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysis and hunting designed for intel and malware analysts as well as threat hunters to get up and running quickly.
Tsirantonakis/wifiphisher
The Rogue Access Point Framework