|
Shell |
49 |
Falco container runtime security extras (default rulesets and more) |
Apr 27, 2022 |
|
None |
2 |
Various patches for the IronMON Ruleset |
Mar 22, 2023 |
|
None |
22 |
Guide For WAF Bypass Techniques |
May 12, 2023 |
|
JavaScript |
2 |
Research project for testing various rendering techniques within the browser (HTML5, WebGl, Worker-based pixelization and … |
Feb 16, 2022 |
|
None |
2 |
Techniques to bypass web application firewall |
Jan 30, 2021 |
|
None |
6 |
A Catalog of Application Whitelisting Bypass Techniques |
Apr 25, 2022 |
|
None |
2 |
A Catalog of Application Whitelisting Bypass Techniques |
Jun 04, 2023 |
|
Shell |
3 |
:closed_book: FIWARE 405: Ruleset Based Permissions |
Apr 22, 2022 |
|
Python |
2 |
Various path planning techniques |
Apr 15, 2021 |
|
C |
2 |
Various dll hollowing techniques |
Feb 22, 2022 |
|
Jupyter Notebook |
5 |
Various research projects |
Mar 25, 2023 |
|
None |
2 |
*Unofficial* DVD specs based on various community-made research. |
May 30, 2023 |
|
HTML |
6 |
Generate random names for your next project based on various techniques |
Aug 15, 2019 |
|
None |
2 |
Various sorting techniques in C++ |
Nov 20, 2022 |
|
C |
6 |
Various Windows anti-debugging techniques |
Sep 23, 2022 |
|
Jupyter Notebook |
3 |
Various techniques to prepare datasets |
Jan 13, 2022 |
|
JavaScript |
2 |
practicing various react methods & techniques |
May 24, 2023 |
|
HTML |
2 |
Interactive components with various techniques |
Jun 19, 2023 |
|
Dockerfile |
8 |
Various tools to bypass the GFW. |
Apr 14, 2023 |
|
C |
68 |
Malware indetectable, with AV bypass techniques, anti-disassembly, etc. |
Aug 04, 2022 |
|
Python |
7 |
💻 Elevate, UAC bypass, privilege escalation, dll hijack techniques |
Sep 17, 2022 |
|
None |
345 |
A centralized resource for previously documented WDAC bypass techniques |
May 24, 2023 |
|
Go |
3 |
Controller that generates falco rules based on Network Policies. |
Feb 07, 2022 |
|
JavaScript |
7 |
Exploration of various large-scale data export techniques for browser-based users |
Jan 28, 2022 |
|
Python |
2 |
💻 Elevate, UAC bypass, persistence, privilege escalation, dll hijack techniques |
Feb 26, 2022 |
|
Python |
3 |
💻 Elevate, UAC bypass, persistence, privilege escalation, dll hijack techniques |
Nov 06, 2019 |
|
Python |
2 |
💻 Elevate, UAC bypass, persistence, privilege escalation, dll hijack techniques |
Oct 23, 2019 |
|
Ruby |
2 |
Various examples of techniques in Ruby |
Feb 29, 2020 |
|
Coq |
3 |
Coq codes using various automation techniques |
Nov 09, 2021 |
|
Python |
3 |
Learning about various image blurring techniques. |
May 09, 2022 |
|
None |
2 |
A ruleset for minecraft servers based around protecting players |
Apr 13, 2022 |
|
Jupyter Notebook |
6 |
Various transformers for FSDP research |
Jul 18, 2022 |
|
JavaScript |
2 |
Research for various UI frameworks |
Feb 29, 2024 |
|
PowerShell |
2 |
Various ways to obfuscate and bypass Windows Defender |
Mar 20, 2023 |
|
Python |
4 |
📑 Comparison of various text summarization techniques. |
Jan 24, 2021 |
|
None |
2 |
PE loader with various shellcode injection techniques |
Apr 07, 2022 |
|
C++ |
112 |
PE loader with various shellcode injection techniques |
May 23, 2022 |
|
Jupyter Notebook |
152 |
Conversational text Analysis using various NLP techniques |
Sep 01, 2022 |
|
Jupyter Notebook |
2 |
Various state estimation techniques using inertial data |
Jan 30, 2021 |
|
Jupyter Notebook |
3 |
Various PyTorch-Techniques for daily Use cases |
Nov 03, 2022 |
|
JavaScript |
41 |
Testing ground for various video streaming techniques. |
Apr 22, 2023 |
|
GLSL |
2 |
Implementation of various graphics techniques in Siv3D |
Mar 01, 2023 |
|
Python |
2 |
A simple repository implementing various cipher techniques. |
Nov 09, 2020 |
|
C# |
145 |
An exploration of various grass rendering techniques |
May 21, 2023 |
|
Jupyter Notebook |
2 |
Music generation using various deep learning techniques. |
Jan 22, 2020 |
|
C++ |
2 |
Offers different problems solved under various techniques!! ;) |
Nov 15, 2023 |
|
None |
147 |
collected & summarized research on the effectiveness of visualization techniques |
Nov 23, 2022 |
|
G-code |
12 |
Default Slicing profiles for various slicing softwares |
Oct 31, 2022 |
|
None |
5 |
A collection of research and survey papers of real-time bidding (RTB) based display advertising techniques. |
Apr 30, 2021 |
|
Go |
4 |
obfuscated vpn solution designed to bypass dpi and advance tls inspection techniques |
Apr 25, 2023 |