Steake / shannon-uncontainedLinks
Shannon-Uncontained. A Docker-free, black‑box‑first fork that treats AI as a fallible witness rather than an oracle: treats uncertainty as a first class citizen via EQBSL epistemic bookkeeping, and agentic recon/analysis/synthesis tuned for “paste url -> pwn box -> ???? -> profit”
☆24Updated last month
Alternatives and similar repositories for shannon-uncontained
Users that are interested in shannon-uncontained are comparing it to the libraries listed below
Sorting:
- Some of the presentations given by me☆19Updated 5 months ago
- ☆12Updated 2 years ago
- ☆18Updated 2 years ago
- Predicting the probability of an exploit being released after a CVE is published (by Machine learning algorithm)☆12Updated 2 years ago
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆15Updated last year
- header-fuzz allows you to fuzz any HTTP header with a wordlist and evaluate success or failure based on the returning HTTP status code.☆16Updated 5 years ago
- Network Traffic Fuzzer☆17Updated last year
- Publishing advisories for CVEs found by POST Cyberforce☆13Updated last year
- subdomain list based on Common Crawl data, sorted by popularity☆17Updated 6 years ago
- Application for detecting command and control (C2) communication through network traffic analysis.☆15Updated 2 years ago
- Build wordlists from the common-crawl index☆12Updated 3 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Updated 2 years ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service and versions.☆16Updated last year
- μετάμάσκα - malevolent payload classifier☆23Updated 2 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17Updated 4 years ago
- Method of finding interesting domains using keywords + JARMs☆13Updated 3 years ago
- One line command and control backdoors for APIs and web applications.☆51Updated last year
- ☆14Updated last year
- ☆10Updated 2 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆16Updated 4 years ago
- ☆13Updated 3 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆32Updated 4 years ago
- HoneyDB Python Module☆14Updated last year
- Simple WebSocket fuzzer☆32Updated 2 years ago
- Script to chain search parameters for MalwareBazaar☆12Updated last year
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Updated 4 years ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Updated last year
- Custom Binary Ninja Themes☆12Updated 2 years ago
- https://arxiv.org/abs/2412.02776☆67Updated last year