☆118Sep 29, 2022Updated 3 years ago
Alternatives and similar repositories for deep_exploit
Users that are interested in deep_exploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆19Feb 22, 2022Updated 4 years ago
- 针对AI画图识别AI的对抗攻击☆31Oct 4, 2023Updated 2 years ago
- Python RAT with reverse connection and asymmetric encrypted communications☆14Jun 30, 2020Updated 5 years ago
- Spark MLib Training Models for Network Security☆16Mar 19, 2018Updated 8 years ago
- Koth - a repository with cheat-sheet Koth in THM (Try Hack Me)☆12Aug 7, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆12Nov 7, 2020Updated 5 years ago
- macos-collector - Automated Collection of macOS Forensic Artifacts for DFIR☆43Apr 13, 2026Updated 3 weeks ago
- FUD Linux Remote Access Trojan☆19Nov 18, 2022Updated 3 years ago
- Private keys that have become public ...☆21Jun 8, 2022Updated 3 years ago
- Repository for dirty scripts and PoCs☆20Feb 18, 2025Updated last year
- Mitrastar MIPS router analysis and exploitation☆20Jul 25, 2021Updated 4 years ago
- Helping navigate through maps to prefer road-way.☆11Apr 6, 2022Updated 4 years ago
- Tool for flashing firmware onto Samsung Galaxy devices☆15Jan 15, 2022Updated 4 years ago
- WebGym: Web-browser-based tasks for RL Agents☆24Feb 4, 2021Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Comprehensive MCP server for bug bounty hunting and web application penetration testing☆29Sep 13, 2025Updated 7 months ago
- AI-powered penetration testing assistant for automating recon, note-taking, and vulnerability analysis.☆949Apr 21, 2026Updated 2 weeks ago
- PowerShell cmdlet to push PowerShell attack modules to a remote system via PSRemoting and if required enable WinRM remotely.☆28Sep 13, 2016Updated 9 years ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆76Sep 6, 2024Updated last year
- An AI-powered web application vulnerability scanner that automates the detection of common security flaws and provides AI-driven insights…☆32Sep 15, 2024Updated last year
- FlatBlur is a flat, minimal, blurried, mid-dark Kvantum theme.☆12Sep 23, 2019Updated 6 years ago
- ☆26Dec 21, 2025Updated 4 months ago
- Python script to execute commands via Erlang/OTP Distribution Protocol☆15Feb 6, 2024Updated 2 years ago
- ☆31Feb 9, 2026Updated 2 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- StealthGuardian is a middleware layer that can be combined with adversary simulation tools to verify the resistance, detection level and…☆20Aug 7, 2024Updated last year
- Nessus is one of the many vulnerability scanners used during vulnerability assessments☆24Aug 25, 2023Updated 2 years ago
- An environment for testing AI pentesting agents against a simulated network.☆206Feb 28, 2024Updated 2 years ago
- The IDOR IN works by systematically scanning a target web application and examining various endpoints, parameters, and data access points…☆25Jun 25, 2023Updated 2 years ago
- ☆11Nov 5, 2018Updated 7 years ago
- 基于AI的BurpSuite漏洞分析插件☆11Sep 21, 2023Updated 2 years ago
- A bash and powershell script to download the latest version of Burp-Suite Professional and use it for free.☆20May 7, 2023Updated 2 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆43Sep 6, 2024Updated last year
- ☆18Jun 30, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- This is the LLM integration app that contains the vulnerability; please use it to verify the vulnerability of the LLM integration app.☆76Apr 3, 2026Updated last month
- ☆15Jan 18, 2020Updated 6 years ago
- FortiOS 管理界面中的堆内存下溢导致远程代码执行☆23Jun 21, 2023Updated 2 years ago
- The purpose of this tool is to automate the payload Creation Process. U can Create Payloads For All Types of OS in Seconds.☆66Dec 11, 2023Updated 2 years ago
- ☆34Apr 16, 2022Updated 4 years ago
- 域信息收集工具☆11Jun 5, 2023Updated 2 years ago
- some sploits☆19Sep 20, 2024Updated last year