ankur8931 / asapLinks
Autonomous Security Analysis and Penetration Testing
☆24Updated 2 years ago
Alternatives and similar repositories for asap
Users that are interested in asap are comparing it to the libraries listed below
Sorting:
- Multi-Agent System for Automated Penetration Testing (MASAPT)☆28Updated 3 years ago
- A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.☆35Updated last year
- Application for detecting command and control (C2) communication through network traffic analysis.☆14Updated 2 years ago
- ☆26Updated last year
- Core A2P2V functionality (command line based)☆68Updated last year
- Framework for Adversarial Malware Evaluation.☆34Updated 3 months ago
- Sukoshi is a proof-of-concept Python/C++ implant that leverages the MQTT protocol for C2 and uses AWS IoT Core as infrastructure.☆46Updated 3 years ago
- Obfuscates a Python Script and the accompanying Shellcode.☆57Updated 5 years ago
- Resources About Persistence, Multiple Platforms. Including ~80 Tools and 300+ Posts.☆100Updated 5 years ago
- SAIVS (Spider Artificial Intelligence Vulnerability Scanner).☆55Updated 4 years ago
- A cross-platform C2/teamserver supporting multiple transport protocols, written in Go.☆45Updated 2 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- POC for CVE-2020-10665 Docker Desktop Local Privilege Escalation☆53Updated 5 years ago
- Forblaze - A Python Mac Steganography Payload Generator☆57Updated 3 years ago
- Predicting the probability of an exploit being released after a CVE is published (by Machine learning algorithm)☆12Updated last year
- ☆50Updated 5 years ago
- Catalog Red Team techniques that cause popups in various macOS versions☆14Updated 8 months ago
- A CALDERA plugin☆66Updated last week
- An AI-powered web application vulnerability scanner that automates the detection of common security flaws and provides AI-driven insights…☆20Updated 10 months ago
- Tool to test for existence of CVE-2020-8218☆22Updated 4 years ago
- Super IOCTL Basic Fuzzer☆15Updated 5 years ago
- Phishing sites configured to work with Netlify form handling☆12Updated 6 years ago
- Red Team C2 and Post Exploitation code☆36Updated last week
- Discord as a C2☆49Updated 4 years ago
- Web access logs analyzer - provides an insight on how remote hosts behave☆15Updated 3 years ago
- CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop)☆29Updated 5 years ago
- A functional exploit for CVE-2019-18634, a BSS overflow in sudo's pwfeedback feature that allows for for privesc☆58Updated 5 years ago
- Burp Suite extension for Radamsa-powered fuzzing with Intruder☆20Updated 3 years ago
- ☆13Updated 7 years ago
- Sources code extracted from malwares for analysis☆38Updated 2 years ago