ankur8931 / asap
Autonomous Security Analysis and Penetration Testing
☆23Updated 2 years ago
Alternatives and similar repositories for asap:
Users that are interested in asap are comparing it to the libraries listed below
- ☆18Updated 3 years ago
- Multi-Agent System for Automated Penetration Testing (MASAPT)☆26Updated 3 years ago
- A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.☆35Updated last year
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆26Updated 4 years ago
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆26Updated 10 months ago
- ☆24Updated 10 months ago
- IoT Malware Similarity Analysis Platform☆44Updated 3 years ago
- Framework for Adversarial Malware Evaluation.☆34Updated 3 weeks ago
- Simple WebSocket fuzzer☆32Updated last year
- An AI-powered web application vulnerability scanner that automates the detection of common security flaws and provides AI-driven insights…☆16Updated 7 months ago
- SAIVS (Spider Artificial Intelligence Vulnerability Scanner).☆55Updated 4 years ago
- Development of Botnet Detection Module for Traffic-Based IoT Devices Using Deep Learning☆14Updated 2 years ago
- Windows GUI/Execution Engine for Atomic Red Team Atomics☆34Updated 4 years ago
- All necessary code in order to feed Sysmon data into Recurrent Neural Network☆17Updated 4 years ago
- Botnet Simulation Framework☆78Updated 4 years ago
- various slides and presentations I've worked on☆18Updated last month
- Import Mitre Att&ck into Neo4j database☆35Updated 2 years ago
- CVE-2020-12828 PoC and Analysis.☆29Updated 4 years ago
- Run PowerShell command without invoking powershell.exe☆35Updated 3 years ago
- Malware Bypass Research using Reinforcement Learning☆105Updated last year
- Collection of IronPython scripts and executables for penetration testing☆55Updated 6 years ago
- Exploits, Exploits, Exploits and more Exploits!☆30Updated 4 years ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Updated 2 years ago
- Gym-based environment for training offensive RL agents. Agents can generalize to unseen scenarios and simulation-trained agents can be de…☆36Updated 7 months ago
- Web access logs analyzer - provides an insight on how remote hosts behave☆15Updated 3 years ago
- ☆19Updated 3 years ago
- A collection of SSL/TLS security related resources.☆52Updated 3 months ago
- ☆24Updated 11 months ago
- This is a Poc for BIGIP iControl unauth RCE☆51Updated 4 years ago
- DLL to open up calc.exe to demonstrate that you injected DLLs☆23Updated 4 years ago