Infosys / data-rapidLinks
Realistic Data Generation tool for Big Data Appliances and AI Solutions
☆13Updated 3 years ago
Alternatives and similar repositories for data-rapid
Users that are interested in data-rapid are comparing it to the libraries listed below
Sorting:
- Official Black Hat Arsenal Security Tools Repository☆10Updated 8 years ago
- 香港民族論☆10Updated 6 years ago
- OSINT Platform - Provides image analysis, digital footprints, video transcription and more. Retrieval Augmented Generation (RAG) capable …☆11Updated last year
- AWS Cloud Landscape Search Engine☆20Updated 2 years ago
- Slides and videos from talks given at cons☆25Updated 7 months ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Updated 2 years ago
- reverse engineered and improved BSQLi script from Coffinxp☆15Updated last year
- CryptChat: Beyond Secure Messaging 🛡️☆71Updated 2 years ago
- First iteration of ML based Feedback WAF☆59Updated last year
- Ransomware Simulator for Blue team ,Ransomware Simulator for Red team ,Ransomware infographic, open source Anti Ransomware, Ransomware As…☆35Updated 4 years ago
- Simple Shellcode Runner in Rust Language☆18Updated 2 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Updated 2 years ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Updated 2 years ago
- It is a project produced to expose the main logic of OSINT-AI tools offered for sale on the DarkWeb☆37Updated last year
- MacroExploit use in excel sheet☆20Updated 2 years ago
- DLink DIR-846 Authenticated Remote Code Execution☆18Updated 2 years ago
- Simulate Windows EXE for Malware Research!☆18Updated last year
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆43Updated 2 years ago
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.☆11Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated last year
- redteamrecipe.com☆24Updated last year
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆26Updated 3 years ago
- A go-exploit to scan for Juniper firewalls vulnerable to CVE-2023-36845☆62Updated 11 months ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Updated 2 years ago
- A command and control (C2) server☆58Updated last year
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆52Updated 3 years ago
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆36Updated last year
- Documents Exfiltration project for fun and educational purposes☆145Updated 2 years ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆49Updated 2 months ago