☆13Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for Pesidious
Users that are interested in Pesidious are comparing it to the libraries listed below
Sorting:
- Malware Mutation Using Reinforcement Learning and Generative Adversarial Networks☆172Oct 1, 2020Updated 5 years ago
- PoC for CVE-2021-3129 (Laravel)☆12Oct 9, 2021Updated 4 years ago
- Carve $MFT records from a chunk of data (for instance a memory dump)☆16Aug 21, 2016Updated 9 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Apr 6, 2024Updated last year
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆75Sep 2, 2022Updated 3 years ago
- Codes for AICS'2019 challenge problem☆22Oct 13, 2019Updated 6 years ago
- An async Python client library for Empire's RESTful API☆26Dec 6, 2023Updated 2 years ago
- C# .Net 5.0 project to build BOF (Beacon Object Files) in mass☆25Jul 25, 2023Updated 2 years ago
- Malware Bypass Research using Reinforcement Learning☆107Apr 22, 2024Updated last year
- ☆29May 10, 2020Updated 5 years ago
- Leghorn code for PKI abuse☆32Jun 17, 2021Updated 4 years ago
- wordlists for password cracking☆29Aug 15, 2022Updated 3 years ago
- A MITRE Caldera plugin written in Python 3 used to convert Red Canary Atomic Red Team Tests to MITRE Caldera Stockpile YAML ability files…☆73Oct 14, 2021Updated 4 years ago
- Framework for Adversarial Malware Evaluation.☆35Mar 31, 2025Updated 11 months ago
- Automate AV evasion by calling AMSI☆88May 31, 2023Updated 2 years ago
- 🔍 "2015 Microsoft Malware Classification Challenge" - Using machine learning to classify malware into different families based on Window…☆31Feb 13, 2024Updated 2 years ago
- Realization of paper: "Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN" 2017☆130Jul 20, 2018Updated 7 years ago
- A process level network security monitoring and enforcement project for Kubernetes, using eBPF☆44Jun 16, 2020Updated 5 years ago
- Create adversarial attacks against machine learning Windows malware detectors☆244Nov 27, 2025Updated 3 months ago
- Continuous kerberoast monitor☆45Aug 24, 2023Updated 2 years ago
- A function tracer☆92Jun 4, 2019Updated 6 years ago
- GUI Tool to Generate Android Payloads.☆10May 20, 2020Updated 5 years ago
- ☆19Jun 9, 2016Updated 9 years ago
- A large and highly detailed volumetric cloud data set, intended to be used for various purposes, including movie and game production as w…☆10Jul 8, 2018Updated 7 years ago
- Curso realizado por Ricardo Narvaja de CrackLatinos (Mirror) http://ricardonarvaja.info☆12May 28, 2018Updated 7 years ago
- A thread dump analyzer tool running on your browser or in your JVM that generates DOT documents out of `jstack` outputs.☆10Jul 10, 2024Updated last year
- A Burp Suite extension implementing the Signing HTTP Messages draft-ietf-httpbis-message-signatures-01 draft.☆41Aug 16, 2022Updated 3 years ago
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Jul 25, 2016Updated 9 years ago
- ☆11May 8, 2022Updated 3 years ago
- HTML5 Training material for Attack and Secure training sessions.☆43Feb 25, 2023Updated 3 years ago
- DNS File EXfiltration☆45Apr 12, 2024Updated last year
- Unofficial api for cve.mitre.org☆40Aug 28, 2021Updated 4 years ago
- ☆11Aug 28, 2024Updated last year
- Scan IPv4 prefixes for DNS revolvers and classify them as open/closed☆10Jun 19, 2014Updated 11 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆10Sep 11, 2020Updated 5 years ago
- ☆14Jul 18, 2019Updated 6 years ago
- Get all possible href | src | url from target url or domain☆40Aug 5, 2020Updated 5 years ago
- Panda - is a set of utilities used to research how PsExec encrypts its traffic.☆12Apr 20, 2021Updated 4 years ago
- Fork of https://code.google.com/p/lorcon/☆12Sep 23, 2013Updated 12 years ago