KhoomeiK / deredact
De-redacting Elon's Email with Character-count Constrained Llama2 Decoding
☆10Updated last year
Alternatives and similar repositories for deredact:
Users that are interested in deredact are comparing it to the libraries listed below
- ☆14Updated last month
- ☆23Updated 2 months ago
- ☆16Updated 7 months ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆15Updated 2 years ago
- ☆17Updated last year
- A collection of tools adversaries commonly use in an attack.☆14Updated 3 months ago
- Parser for Windows PowerShell script block logs☆13Updated 2 months ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆14Updated last year
- Fuzz Network Traffic☆18Updated 2 months ago
- Zeek Profinet I/O Context Manager Parser - CISA ICSNPP☆10Updated 4 months ago
- vyos based isolation of networks☆11Updated 4 years ago
- CloudFlare Worker Shell☆14Updated 4 years ago
- Create an AMI with CobaltStrike and related tools.☆8Updated this week
- Phishing sites configured to work with Netlify form handling☆12Updated 5 years ago
- Auto updating archive of my Twitter lists.☆15Updated 3 months ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆39Updated 6 months ago
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆23Updated 3 years ago
- Security and Privacy Failures in Popular 2FA Apps☆19Updated last year
- A TikTok - Live Watcher application for tty / cli - for the unlikely situation when you live in tty, but want to watch TikTok Live.☆26Updated 6 months ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- CDitter - Electromechanical based data exfiltration, through the movement of a CD drive☆12Updated 2 years ago
- ☆19Updated 11 months ago
- Use a LLM to create the ultimate Leek AI for Leek Wars! 🥬☆13Updated 10 months ago
- python3 scripts to help with aws triage needs☆15Updated 3 years ago
- Developper-proof prevention of SQL injection (java library)☆11Updated 4 years ago
- A curated list of Cloud Security techniques and tools☆30Updated last year