KiruthikaKuppusaamy / C-Programming-Exercise
☆12Updated 4 months ago
Related projects: ⓘ
- ☆56Updated 2 years ago
- ☆18Updated last year
- ☆13Updated this week
- Software Vulnerabilities to Weakness Mapping☆22Updated 2 years ago
- The Common Vulnerabilities Exposures (CVE) Database☆19Updated 5 months ago
- A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.☆27Updated last year
- ☆15Updated 2 years ago
- Simple Malware Scanner written in python☆86Updated last year
- EVIL (Exploiting software VIa natural Language) is an approach to automatically generate software exploits in assembly/Python language fr…☆26Updated 2 years ago
- While Flaresolverr provides a proxy solution, it currently lacks support for headers and JSON payloads. To bridge this gap, Flaresolverr …☆20Updated last month
- Adversarial Malware Generator Using GANs☆49Updated last month
- Dataset of Probing Attacks (Port Scan) performed with nmap, unicornscan, hping3, zmap and masscan☆27Updated last year
- This tool helps new security professionals actively learn how to address security concerns associated with open ports on a network device…☆20Updated last year
- An Interface for AI built for cybersecurity professionals☆79Updated this week
- Pentest AI utilizes machine learning to fully automate penetration testing and exploitation for assessing port, web, and application secu…☆18Updated last month
- A simple, dockerized python based Command and Control(C2) Framework named SpyderC2☆35Updated last year
- This repository contains the files that provide the upload functionality in the IIS Server☆26Updated 3 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆20Updated 2 years ago
- Ransomware for demonstration☆14Updated last year
- This is a repository containing code to generate a PowerShell payload to access PCs remotely. For more information check this out 👇👇👇☆16Updated 2 years ago
- This repo is just a guide where you can find all labs of burp suite resolved, you can see the workflow and all type of web attacks☆12Updated 2 years ago
- With this script you can bypass both root detection and ssl pinning for your android app.☆80Updated last year
- Multi-Agent System for Automated Penetration Testing (MASAPT)☆19Updated 2 years ago
- Analyze your code locally using a GPT LLM.☆32Updated 8 months ago
- Steganography software for encrypting text into image that uses modified version of LSB (Least Significant Bit) algorithm.☆57Updated 4 years ago
- proxychains is a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, …☆24Updated last year
- ☆71Updated 3 years ago
- Multi-threaded URL enumeration/content-discovery tool in Python.☆106Updated 7 months ago
- Cross Site Scripting ( XSS ) Vulnerability Payload List☆22Updated 3 years ago
- an extension for Burp Suite to allow researchers to utilize GPT for analys is of HTTP requests and responses☆89Updated last year
- The Red-book: The Art of Offensive CyberSecurity☆20Updated 2 weeks ago