ankur8931 / asapLinks
Autonomous Security Analysis and Penetration Testing
☆25Updated 3 years ago
Alternatives and similar repositories for asap
Users that are interested in asap are comparing it to the libraries listed below
Sorting:
- Multi-Agent System for Automated Penetration Testing (MASAPT)☆30Updated 4 years ago
- SAIVS (Spider Artificial Intelligence Vulnerability Scanner).☆54Updated 5 years ago
- ☆13Updated 3 years ago
- Modeling Password Guessability Using Markov Models☆57Updated 6 years ago
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆27Updated last year
- Framework for Adversarial Malware Evaluation.☆35Updated 10 months ago
- PenGym: Pentesting Training Framework for Reinforcement Learning Agents☆53Updated last year
- A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.☆37Updated 2 years ago
- Advanced threat detection solution for Linux.☆36Updated 5 years ago
- Repository collecting and automagically processing public threat intelligence reports.☆18Updated 5 years ago
- go-atomicredteam is a Golang application to execute tests as defined in the atomics folder of Red Canary's Atomic Red Team project (https…☆49Updated 2 years ago
- Malware Mutation Using Reinforcement Learning and Generative Adversarial Networks☆173Updated 5 years ago
- All necessary code in order to feed Sysmon data into Recurrent Neural Network☆17Updated 5 years ago
- Core A2P2V functionality (command line based)☆68Updated last year
- GPT-3 use cases for Cybersecurity☆53Updated 2 years ago
- Cybersecurity of Machine Learning and Artificial Intelligence☆69Updated 3 years ago
- A logic-based enterprise network security analyzer☆137Updated 3 years ago
- Modelling Capture-the-Flag Challenges Using Reinforcement Learning☆15Updated 3 years ago
- Automatically collects the known CVE and its corresponding Poc, and sends it to the LLM for analysis, disassembles the attack steps, gene…☆20Updated last year
- Botnet Simulation Framework☆78Updated 5 years ago
- Resources About Persistence, Multiple Platforms. Including ~80 Tools and 300+ Posts.☆106Updated 5 years ago
- A Scrapy-based crawler for crawling Exploit Database☆12Updated 7 years ago
- DNSpooq - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685)☆100Updated 5 years ago
- A Python3 module to assist in fuzzing web applications☆57Updated 2 years ago
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆43Updated last year
- CVE-2020-12828 PoC and Analysis.☆28Updated 5 years ago
- GyoiThon is a growing penetration test tool using Machine Learning.☆18Updated 5 years ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆43Updated 3 years ago
- ☆13Updated 4 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆33Updated 4 years ago