Raphaël Vinot
Rafiot
Languages
Top Repositories
A bunch of certificates from the Hacking Team leak
USB key cleaner
Clone of PDFiD by Didier Stevens, as a package and with some improvements.
For an Internet Service Provider, AS numbers are a logical representation of the other ISP peering or communicating with his autonomous system. ISP customers are using the capacity of the Internet Service Provider to reach Internet services over other AS. Some of those communications can be malicious (e.g. due to malware activities on an end-user equipments) and hosted at specific AS location. In order to provide an improved security view on those AS numbers, a trust ranking scheme will be implemented based on existing dataset of compromised systems, malware C&C IP and existing datasets of the ISPs.
Implementation of a Whois Server with a redis backend
This a clone of the trunk of aligot available on google code. WARNING: might be outdated.
Repositories
183Fetch the occupancy of the pools in Bordeaux every 15 min
Clone of PDFiD by Didier Stevens, as a package and with some improvements.
Sometimes, I want to know the general status of the tram network.
A bunch of certificates from the Hacking Team leak
Library to generate / parse / compare ssdeep Context Triggered Piecewise Hashes (CTPH)
CrawlerBox is an automated analysis framework designed for parsing emails and crawling embedded web resources.
This project aims to provide a simple way to get the description of an ASN, and to see the changes over the time.
Python client for Assemblyline 3 and 4 / Client python pour AssemblyLine 3 and 4
USB key cleaner
For an Internet Service Provider, AS numbers are a logical representation of the other ISP peering or communicating with his autonomous system. ISP customers are using the capacity of the Internet Service Provider to reach Internet services over other AS. Some of those communications can be malicious (e.g. due to malware activities on an end-user equipments) and hosted at specific AS location. In order to provide an improved security view on those AS numbers, a trust ranking scheme will be implemented based on existing dataset of compromised systems, malware C&C IP and existing datasets of the ISPs.
This a clone of the trunk of aligot available on google code. WARNING: might be outdated.
Valkey Python client based on a fork of redis-py
extract text from any document. no muss. no fuss.
An open source Valkey client library that supports Valkey and Redis open source 6.2, 7.0 and 7.2. Valkey GLIDE is designed for reliability, optimized performance, and high-availability, for Valkey and Redis OSS based applications. GLIDE is a multi language client library, written in Rust with programming language bindings, such as Java and Python
A flexible distributed key-value datastore that supports both caching and beyond caching workloads.
Capitole du Libre Website
Implementation of a Whois Server with a redis backend
Pure python implementation of identifying files based off their magic numbers
Microsoft Graph Security API applications and services.
🇫🇷 Oh my tmux! My self-contained, pretty & versatile tmux configuration made with ❤️
Python bindings for ssdeep
HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.
No description provided.
No description provided.
A (nearly) production ready Dockered MISP
Similarius is a Python library to compare web page and evaluate the level of similarity.
Extracts emails and attachments saved in Microsoft Outlook's .msg files
A proposed standard that allows websites to define security policies.
A pure-python library for creating and extracting cab files
Static website for security.txt.