ankur8931 / asapLinks
Autonomous Security Analysis and Penetration Testing
☆24Updated 2 years ago
Alternatives and similar repositories for asap
Users that are interested in asap are comparing it to the libraries listed below
Sorting:
- A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.☆38Updated 2 years ago
- Multi-Agent System for Automated Penetration Testing (MASAPT)☆28Updated 3 years ago
- Automatically collects the known CVE and its corresponding Poc, and sends it to the LLM for analysis, disassembles the attack steps, gene…☆20Updated last year
- Forblaze - A Python Mac Steganography Payload Generator☆57Updated 3 years ago
- SAIVS (Spider Artificial Intelligence Vulnerability Scanner).☆54Updated 4 years ago
- 2022 CTF public release☆23Updated 3 years ago
- Advanced threat detection solution for Linux.☆35Updated 4 years ago
- A simple tool to create mermaid js markdown charts from CVE IDs and CVE keyword searches.☆45Updated 2 years ago
- Core A2P2V functionality (command line based)☆68Updated last year
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- ☆28Updated last year
- A cross-platform C2/teamserver supporting multiple transport protocols, written in Go.☆45Updated 2 years ago
- various slides and presentations I've worked on☆19Updated 6 months ago
- All necessary code in order to feed Sysmon data into Recurrent Neural Network☆17Updated 5 years ago
- Detecting Cobalt Strike Team Servers on targets through traffic telemetry.☆22Updated last year
- Framework for Adversarial Malware Evaluation.☆34Updated 6 months ago
- A CALDERA plugin☆69Updated last week
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Updated 2 years ago
- ☆43Updated 4 months ago
- go-atomicredteam is a Golang application to execute tests as defined in the atomics folder of Red Canary's Atomic Red Team project (https…☆49Updated 2 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆30Updated 4 years ago
- GPT-3 use cases for Cybersecurity☆52Updated 2 years ago
- Resources About Persistence, Multiple Platforms. Including ~80 Tools and 300+ Posts.☆103Updated 5 years ago
- Application for detecting command and control (C2) communication through network traffic analysis.☆15Updated 2 years ago
- Simple WebSocket fuzzer☆32Updated 2 years ago
- using ML models for red teaming☆44Updated 2 years ago
- Discord as a C2☆49Updated 4 years ago
- Catalog Red Team techniques that cause popups in various macOS versions☆15Updated 10 months ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆74Updated 4 years ago
- Some of the presentations given by me☆19Updated 2 months ago