GyoiThon is a growing penetration test tool using Machine Learning.
☆18Apr 28, 2020Updated 5 years ago
Alternatives and similar repositories for GyoiThon
Users that are interested in GyoiThon are comparing it to the libraries listed below
Sorting:
- SAIVS (Spider Artificial Intelligence Vulnerability Scanner).☆54Nov 13, 2020Updated 5 years ago
- ☆15Jan 8, 2020Updated 6 years ago
- The system is broken face recognition for adversarial example testing.☆20Aug 18, 2021Updated 4 years ago
- Password and email checker. It is your password or email compromissed? Check it now!☆11Dec 8, 2022Updated 3 years ago
- Code for "Analyzing the Perceived Severity of Cybersecurity Threats Reported on Social Media".☆25Jul 1, 2019Updated 6 years ago
- Creating function call graphs based on radare2 framwork, plot fancy graphs and extract behavior indicators☆33Dec 11, 2016Updated 9 years ago
- Source code about machine learning and security.☆2,077Sep 2, 2022Updated 3 years ago
- A framework for static analysis of ROP exploits and programs☆41May 13, 2019Updated 6 years ago
- PEVuln: A Benchmark Dataset for Using Machine Learning to Detect Vulnerabilities in PE Malware☆14Nov 26, 2025Updated 3 months ago
- 哔哩哔哩(https://www.bilibili.com )读取楼层,发送评论,抢楼,抢沙发☆11Apr 16, 2018Updated 7 years ago
- PoC List☆10Sep 4, 2022Updated 3 years ago
- Extract username and passwords from IPTV urls☆12Nov 8, 2025Updated 4 months ago
- Python script to send SMS using Huawei new[er] USB dongles via the HTTP interface☆11Jul 10, 2017Updated 8 years ago
- Code repository for experiments in SpecROP paper☆13Sep 3, 2021Updated 4 years ago
- ☆11Jun 20, 2023Updated 2 years ago
- Advanced file format fuzzer based-on deep neural language models.☆41Apr 13, 2023Updated 2 years ago
- Cobalt Strike automation scripts collection☆12Oct 28, 2020Updated 5 years ago
- afl-pytmin is a wrapper of afl-tmin, test case minimizer for American Fuzzy Lop (afl).☆13Apr 14, 2017Updated 8 years ago
- ☆24Sep 16, 2025Updated 5 months ago
- Monocerus emulator framework☆11Mar 28, 2019Updated 6 years ago
- hcidump for android☆10Jan 28, 2015Updated 11 years ago
- Converts a PCAP file to a PANDAS or SFRAME data frame☆14Apr 19, 2019Updated 6 years ago
- Windows frontend for digging SSH tunnels and creating socks proxies☆12Nov 19, 2023Updated 2 years ago
- Dev Ops Dashboard for Petabyte Scale AI Data Lake☆12Mar 28, 2023Updated 2 years ago
- ☆11Jan 23, 2020Updated 6 years ago
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- exploit-db备份☆14Jan 5, 2022Updated 4 years ago
- [PHP][Python] Root Exploiter – No Back-Connect☆10Aug 27, 2021Updated 4 years ago
- No one writes dumb malware anymore. This is a repo for dumb malware.☆10Apr 18, 2017Updated 8 years ago
- Virtual host bruteforcer against given network range or single ip☆11Mar 21, 2019Updated 6 years ago
- ☆12Jun 8, 2021Updated 4 years ago
- Source and public feature and bug reporting for Euclideon Vault Client☆14Feb 20, 2025Updated last year
- Provides a multi-platform Graphical User Interface for hashlookup☆12Jul 12, 2024Updated last year
- Quantum Insert Backdoor POC☆11May 21, 2017Updated 8 years ago
- YesMan☆16Nov 8, 2023Updated 2 years ago
- ccm - A small python library that helps identify vulnerabilities inside of encrypted data☆11Aug 17, 2020Updated 5 years ago
- Linux group_info refcounter overflow use afer free☆13May 4, 2014Updated 11 years ago
- ☆14Nov 12, 2024Updated last year
- Web Crawler and Scraper☆12Jul 6, 2022Updated 3 years ago