Pinned Repositories
Awesome-Vulnerability-Research
🦄 A curated list of the awesome resources about the Vulnerability Research
BinarySearch
binary search
byob
BYOB (Build Your Own Botnet)
chimera_loader
ChimeraPE (a PE injector type - alternative to: RunPE, ReflectiveLoader, etc)
CircularPicker
thermostat
Controller_keys
Controller_keys
crypto_utils
Set of my small utils related to cryptography, encoding, decoding etc
deep-face-recognition
One-shot Learning and deep face recognition notebooks and workshop materials
DeepSpeech
A TensorFlow implementation of Baidu's DeepSpeech architecture
py2n's Repositories
py2n/Awesome-Vulnerability-Research
🦄 A curated list of the awesome resources about the Vulnerability Research
py2n/BinarySearch
binary search
py2n/byob
BYOB (Build Your Own Botnet)
py2n/chimera_loader
ChimeraPE (a PE injector type - alternative to: RunPE, ReflectiveLoader, etc)
py2n/CircularPicker
thermostat
py2n/Controller_keys
Controller_keys
py2n/crypto_utils
Set of my small utils related to cryptography, encoding, decoding etc
py2n/deep-face-recognition
One-shot Learning and deep face recognition notebooks and workshop materials
py2n/DeepSpeech
A TensorFlow implementation of Baidu's DeepSpeech architecture
py2n/demos
Demos of various injection techniques found in malware
py2n/encryptor
initial commit
py2n/Examples
A collection of TLA+ specifications of varying complexities
py2n/game-project-spin
py2n/hexo
A clean hexo install. Hexo is a fast, simple & powerful blog framework, powered by Node.js
py2n/LinearSearchTime
linear search
py2n/malware_analysis
Various snippets created during malware analysis
py2n/middleman
A clean Middleman install. Middleman is a static site generator using all the shortcuts and tools in modern web development.
py2n/money_transfer
py2n/MyApplication-salam
say-hello-to-allah
py2n/Optimal_Binary_Search_Tree
create an optimal binary search tree using dynamic programming and then show the tree
py2n/pe-sieve
a small tool for investigating inline hooks (and other in-memory code patches)
py2n/process_chameleon
A process overwriting its own PEB to make an illusion that it has been loaded from a different path.
py2n/process_doppelganging
My implementation of enSilo's Process Doppelganging (PE injection technique)
py2n/reverse-engineering-reference-manual
Here is a collage of reverse engineering topics that I find interesting
py2n/salam
initial project
py2n/signature-base
Signature base for my scanner tools
py2n/tsunami-security-scanner
Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence.
py2n/Veil
Veil 3.0
py2n/webdriver-rust
Library implementing the wire protocol for the W3C WebDriver standard.
py2n/wickr-crypto-c
An implementation of the Wickr Secure Messaging Protocol in C