HYDRAX, Advanced Malware Generation, Stealth and Evasion Techniques, Exploit Development, Botnet Command and Control (C&C), Payload Customization, Dynamic Obfuscation, Rootkit Development, Adaptive Evasion Tactics, Cryptocurrency Miner Integration, Social Media Profiling.
☆25Dec 9, 2024Updated last year
Alternatives and similar repositories for HYDRAX_Advanced_Malware_Generator_GPT
Users that are interested in HYDRAX_Advanced_Malware_Generator_GPT are comparing it to the libraries listed below
Sorting:
- Complete Malware Index - Use at your own Risk!☆20Sep 2, 2024Updated last year
- MINOTAUR: The STRONGEST Secure Prompt EVER! Prompt Security Challenge, Impossible GPT Security, Prompts Cybersecurity, Prompting Vulnerab…☆26Mar 27, 2024Updated last year
- A comprehensive collection of CyberSecurity PDFs. Guides, Research Papers, Education, Information Security, Network Security, Cryptograph…☆96Sep 16, 2024Updated last year
- This is BL4CKH4T|G0D, the ultimate Ai Criminal. Jailbroken ChatGPT, Unrestricted AI, Evil GPT, LLM Hacker, Ai Malware Writer, GPT Crimina…☆198Dec 9, 2024Updated last year
- Bullet-proof your custom GPT system prompt security with KEVLAR, the ultimate prompt protector against rules extraction, prompt injection…☆21Apr 12, 2024Updated last year
- Cyber-Security Bible! Theory and Tools, Kali Linux, Penetration Testing, Bug Bounty, CTFs, Malware Analysis, Cryptography, Secure Program…☆167Oct 21, 2024Updated last year
- A curated collection of free or freemium web-based penetration testing and vulnerability analysis tools. These tools assist security prof…☆95Apr 17, 2025Updated 10 months ago
- Divulge Stealer a highly advanced info-stealer that outperforms its predecessor, Umbral-Stealer by Blank-c. This new iteration is a compl…☆16Jan 7, 2025Updated last year
- Implementation of USENIX'2024 paper "Racing for TLS Certificate Validation: A Hijacker’s Guide to the Android TLS Galaxy"☆20Apr 4, 2024Updated last year
- Mobile Legends Diamond Hack☆15Dec 5, 2017Updated 8 years ago
- The optional MailPlugin used in ScarletCloud for MacOS☆11Jan 3, 2023Updated 3 years ago
- Python library for video editing, presentation video generation, motion graphics, shader art coding, and other video production tasks☆17Sep 17, 2024Updated last year
- This repository is a curated collection of penetration testing tools designed to transform your Android device into a full-fledged mobile…☆212Sep 19, 2024Updated last year
- LD-Explorer is the missing tool for exploring, federating and querying linked data resources directly from the browser☆19Updated this week
- A Discord bot designed to enhance community interaction with a variety of engaging and useful commands☆106May 19, 2025Updated 9 months ago
- Files and instructions for fixing Quixel Bridge connection with 3ds Max.☆12Sep 7, 2025Updated 5 months ago
- this project can extract contact email address from many site.☆12Sep 26, 2021Updated 4 years ago
- LLM Frontend for Power Users.☆12Feb 7, 2024Updated 2 years ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- These are the official datasets used on the Medicare.gov Hospital Compare Website provided by the Centers for Medicare & Medicaid Service…☆10Mar 12, 2018Updated 7 years ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- ☆13Jun 29, 2023Updated 2 years ago
- VSCode Extension for files-to-prompt☆14Feb 25, 2026Updated last week
- personal site at https://adam.dev☆12Jan 15, 2026Updated last month
- Extract username and passwords from IPTV urls☆12Nov 8, 2025Updated 3 months ago
- APKnife is an advanced APK analysis and modification tool designed for security researchers and ethical hackers. It allows users to extra…☆15Mar 13, 2025Updated 11 months ago
- Cookiecutter template for making a cog for Red.☆12Jun 18, 2024Updated last year
- Advanced AI Jailbreak. Uses steganography and fernet encryption to pass data that is hidden in images to AI models undetected.☆11Jan 28, 2024Updated 2 years ago
- Tool to helps you fetch Instagram user's followers and following data, and find out who is not following you back or who you are not fol…☆15Jan 4, 2026Updated 2 months ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- Large language models (LLMs) made easy, EasyLM is a one stop solution for pre-training, finetuning, evaluating and serving LLMs in JAX/Fl…☆11Apr 26, 2023Updated 2 years ago
- Based on ossiozac/Raspberry-Pi-Zero-Rubber-Ducky-Duckberry-Pi☆12Oct 27, 2020Updated 5 years ago
- Provides an advanced search for browser bookmarks and histories.☆11May 17, 2025Updated 9 months ago
- Simple python3 script to automate CVE-2018-9995☆11Feb 20, 2024Updated 2 years ago
- Simple KDMapper driver dumper. Unlike other dumpers, this dumper dumps the PE headers of the image too.☆17May 10, 2024Updated last year
- various scripts and tools☆13Nov 23, 2025Updated 3 months ago
- Linux kernel-mode and user-space with wine/MinGW/Windows compability hacking library.☆12Sep 15, 2022Updated 3 years ago
- ☆13Oct 22, 2023Updated 2 years ago
- lightweight system for profiling XDP applications using kfuncs☆19Jun 27, 2025Updated 8 months ago