ankur8931 / asapLinks
Autonomous Security Analysis and Penetration Testing
☆24Updated 2 years ago
Alternatives and similar repositories for asap
Users that are interested in asap are comparing it to the libraries listed below
Sorting:
- Multi-Agent System for Automated Penetration Testing (MASAPT)☆29Updated 3 years ago
- SAIVS (Spider Artificial Intelligence Vulnerability Scanner).☆54Updated 4 years ago
- GPT-3 use cases for Cybersecurity☆52Updated 2 years ago
- Application for detecting command and control (C2) communication through network traffic analysis.☆15Updated 2 years ago
- Framework for Adversarial Malware Evaluation.☆34Updated 7 months ago
- Core A2P2V functionality (command line based)☆68Updated last year
- All necessary code in order to feed Sysmon data into Recurrent Neural Network☆17Updated 5 years ago
- A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.☆38Updated 2 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆30Updated 4 years ago
- A CALDERA plugin☆70Updated 3 weeks ago
- Malware Mutation Using Reinforcement Learning and Generative Adversarial Networks☆169Updated 5 years ago
- Discord as a C2☆49Updated 4 years ago
- Resources About Persistence, Multiple Platforms. Including ~80 Tools and 300+ Posts.☆104Updated 5 years ago
- Python3 Metasploit automation library☆22Updated 2 years ago
- ☆67Updated 2 years ago
- A cross-platform C2/teamserver supporting multiple transport protocols, written in Go.☆45Updated 2 years ago
- Windows GUI/Execution Engine for Atomic Red Team Atomics☆35Updated 5 years ago
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆27Updated last year
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Web access logs analyzer - provides an insight on how remote hosts behave☆15Updated 4 years ago
- Sukoshi is a proof-of-concept Python/C++ implant that leverages the MQTT protocol for C2 and uses AWS IoT Core as infrastructure.☆46Updated 3 years ago
- IoT and Operational Technology Honeypot☆104Updated 2 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆74Updated 4 years ago
- Some of the presentations given by me☆19Updated 2 months ago
- ☆13Updated 2 years ago
- various slides and presentations I've worked on☆19Updated 7 months ago
- Exploits developped by Outflank B.V. team members☆21Updated 8 years ago
- This is an implementation of the CVE-2020-0796 aka SMBGhost vulnerability, compatible with the Metasploit Framework☆19Updated 5 years ago
- RustHunter is a modular incident response framework based on Rust and Ansible to build and compare environmental baselines.☆18Updated 3 years ago
- ☆50Updated 5 years ago