KhoomeiK / deredact
De-redacting Elon's Email with Character-count Constrained Llama2 Decoding
☆10Updated last year
Alternatives and similar repositories for deredact:
Users that are interested in deredact are comparing it to the libraries listed below
- Security and Privacy Failures in Popular 2FA Apps☆19Updated last year
- ☆14Updated last month
- ☆17Updated last year
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆39Updated 6 months ago
- Zeek Profinet I/O Context Manager Parser - CISA ICSNPP☆10Updated 4 months ago
- vyos based isolation of networks☆11Updated 4 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 3 months ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆14Updated last year
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆15Updated 3 years ago
- ☆23Updated 2 months ago
- ☆16Updated 7 months ago
- Scan and decode NetWire logs☆11Updated 2 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- siml is a CLI tool for discovering similar, related to, competitive, or alternative options to a given site.☆13Updated last year
- Developper-proof prevention of SQL injection (java library)☆11Updated 4 years ago
- Open YARA scan- and search engine☆20Updated 2 weeks ago
- Manticore's Public Threats Repository☆10Updated 4 years ago
- ☆19Updated 11 months ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆18Updated last year
- Phishing sites configured to work with Netlify form handling☆12Updated 5 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆15Updated 2 years ago
- Perform file-based malware scan on your on-prem servers with AWS☆12Updated last year
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆14Updated 4 years ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆17Updated 3 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated 10 months ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago