504sarwarerror / SAVANTLinks
A RAG model trained on malware samples, It is designed to generate new malware
☆40Updated last month
Alternatives and similar repositories for SAVANT
Users that are interested in SAVANT are comparing it to the libraries listed below
Sorting:
- Modular malware framework to build custom payloads, designed for advanced adversary simulation and malware research☆311Updated last week
- 🏴☠️ Hacking Guides, Demos and Proof-of-Concepts 🥷☆206Updated last month
- A blind SQL injection brute forcer☆111Updated 5 months ago
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆278Updated last year
- Quick scripts I developed to streamline OSCP tasks☆184Updated 3 months ago
- ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making i…☆134Updated 2 weeks ago
- LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectabl…☆113Updated this week
- This repository contains cutting-edge open-source security notes and tools that will help you during your Red Team assessments.☆341Updated 4 months ago
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆199Updated 2 months ago
- A visual methodology tracking platform tailored for offensive security assessments☆212Updated last week
- Curated repository of malware samples preserved for research and analysis. All samples are kept behind Blackwall poke around with caution☆26Updated last month
- A powershell module for hiding payloads in the pixels of images☆79Updated last year
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆90Updated 4 months ago
- Living Off The Land (LOTL) persistent Reverse shell☆101Updated last year
- Network Forensics CLI utility that performs Network Scanning, OSINT, and Attack Detection☆285Updated 10 months ago
- :')☆46Updated last month
- This is a local search engine to search for cybersecurity tools. It has 3000+ tools in it's database.☆97Updated last week
- What the name says....☆99Updated last year
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆126Updated 6 months ago
- ☆123Updated this week
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆75Updated 3 weeks ago
- 🔍 PANO: Advanced OSINT investigation platform combining graph visualization, timeline analysis, and AI assistance to uncover hidden conn…☆313Updated 5 months ago
- ☆125Updated 3 months ago
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆189Updated this week
- WifiForge is a tool developed by Black Hills InfoSec to help train Pentesters on different Wi-Fi attack vectors and Wireless capabilities…☆366Updated this week
- The easiest way to achieve a reverse shell bypassing Windows Defender. Windows Evasion | Windows Defender Evasion | Windows Defender Bypa…☆38Updated last month
- ☆41Updated 9 months ago
- Knowledge Management for Offensive Security Professionals Official Repository☆149Updated 7 months ago
- A collection of all my personal cheat sheets and guides as I progress through my career in offensive security.☆241Updated 8 months ago
- Phone: A Mobile Phone Forensic Framework ( Android )☆204Updated 6 months ago