Infosys / data-rapidLinks
Realistic Data Generation tool for Big Data Appliances and AI Solutions
☆13Updated 3 years ago
Alternatives and similar repositories for data-rapid
Users that are interested in data-rapid are comparing it to the libraries listed below
Sorting:
- 香港民族論☆10Updated 6 years ago
- Official Black Hat Arsenal Security Tools Repository☆10Updated 8 years ago
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆26Updated 3 years ago
- Slides and videos from talks given at cons☆25Updated 7 months ago
- AWS Cloud Landscape Search Engine☆20Updated 2 years ago
- A CRYPTOJACKING PROGRAM (MALWARE) >:)☆39Updated 4 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆52Updated 3 years ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Updated 2 years ago
- OSINT Platform - Provides image analysis, digital footprints, video transcription and more. Retrieval Augmented Generation (RAG) capable …☆11Updated last year
- Website defacement attack detection with deep learning☆62Updated last year
- reverse engineered and improved BSQLi script from Coffinxp☆15Updated last year
- A network logging tool that logs per process activities☆32Updated 2 years ago
- Short Programs For Spreading Malware☆16Updated 4 years ago
- This is a working variant of the Mirai IOT botnet☆15Updated 3 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- This is a simulation of attack by the Cozy Bear group (APT-29) targeting diplomatic missions☆46Updated last year
- A python tool(automation) for automatically finding SSH servers on the network and adding them to the botnet for mass administration and …☆40Updated 2 years ago
- Simulation of Akira Ransomware with Invoke-AtomicTest☆18Updated last year
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 3 years ago
- A go-exploit to scan for Juniper firewalls vulnerable to CVE-2023-36845☆62Updated 11 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated last year
- Ransomware Simulator for Blue team ,Ransomware Simulator for Red team ,Ransomware infographic, open source Anti Ransomware, Ransomware As…☆35Updated 4 years ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Updated last year
- A powerful and flexible tool to apply active attacks for disrupting stegomalware☆54Updated 3 years ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆24Updated last year
- A powerful reverse shell generator☆46Updated 3 years ago
- The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromis…☆126Updated last year
- Enumeration & fingerprint tool☆24Updated last year
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆44Updated 2 years ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Updated last year