ankur8931 / asapLinks
Autonomous Security Analysis and Penetration Testing
☆24Updated 2 years ago
Alternatives and similar repositories for asap
Users that are interested in asap are comparing it to the libraries listed below
Sorting:
- Multi-Agent System for Automated Penetration Testing (MASAPT)☆27Updated 3 years ago
- ☆19Updated 3 years ago
- GPT-3 use cases for Cybersecurity☆53Updated last year
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆26Updated last year
- A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.☆35Updated last year
- SAIVS (Spider Artificial Intelligence Vulnerability Scanner).☆55Updated 4 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆27Updated 4 years ago
- Botnet Simulation Framework☆77Updated 4 years ago
- Quantum Insert Backdoor POC☆11Updated 8 years ago
- Framework for Adversarial Malware Evaluation.☆34Updated 2 months ago
- ☆50Updated 4 years ago
- Machine Learning for Cyber Security☆30Updated 3 years ago
- CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop)☆29Updated 5 years ago
- ☆19Updated 3 years ago
- A PPO agent leveraging reinforcement learning performs Penetration Testing in a simulated computer network environment. The agent is trai…☆27Updated 2 months ago
- ☆13Updated 2 years ago
- Pulse Secure SSL VPN pre-auth file reading☆50Updated 5 years ago
- YAWNING TITAN is an abstract, graph based cyber-security simulation environment that supports the training of intelligent agents for auto…☆64Updated last year
- Conference Papers and Appendicies (USENIX Security, BlackHat, HITBSecConf, and BeVX)☆26Updated last year
- Malware Bypass Research using Reinforcement Learning☆105Updated last year
- ☆26Updated last year
- Burp Suite extension for Radamsa-powered fuzzing with Intruder☆20Updated 3 years ago
- Core A2P2V functionality (command line based)☆68Updated last year
- CVE-2020-12828 PoC and Analysis.☆29Updated 4 years ago
- Advanced Persistent Threat Detection Using Network Analysis☆22Updated 6 years ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Updated 2 years ago
- ☆24Updated 5 years ago
- Roundcube 1.0.0 <= 1.2.2 Remote Code Execution exploit and vulnerable container☆47Updated last year
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Updated 4 years ago
- Get all cve corresponding to a specific keyword or a list of keywords from the mitre database (https://cve.mitre.org/)☆16Updated 2 years ago