cchio / deep-pwning
Metasploit for machine learning.
☆565Updated 2 years ago
Alternatives and similar repositories for deep-pwning
Users that are interested in deep-pwning are comparing it to the libraries listed below
Sorting:
- ☆623Updated 2 years ago
- An evolutionary framework for evading machine learning-based malware classifiers.☆110Updated 2 years ago
- PoC code from DEF CON 25 presentation☆242Updated 7 years ago
- GyoiThon is a growing penetration test tool using Machine Learning.☆764Updated 2 years ago
- A framework for Backdoor development!☆437Updated 7 years ago
- Limon is a sandbox developed as a research project written in python, which automatically collects, analyzes, and reports on the run time…☆393Updated 8 years ago
- #AISecurity☆1,429Updated this week
- Documentation for the Mechanical Phish.☆233Updated 8 years ago
- A tool to predict vulnerability discovery of binary only programs☆188Updated 7 years ago
- Detection of malware using dynamic behavior and Windows audit logs☆76Updated 9 years ago
- A Python Package for Data Exfiltration☆783Updated last year
- Files from my DEFCON CTF VM.☆270Updated 8 years ago
- A shellcode writing toolkit☆670Updated 3 years ago
- Curated list of tools and resources related to the use of machine learning for cyber security☆1,494Updated 4 years ago
- CuckooML: Machine Learning for Cuckoo Sandbox☆145Updated 2 years ago
- Automated Linux evil maid attack☆427Updated 9 years ago
- Machine learning driven web application firewall to detect malicious queries with high accuracy.☆425Updated 8 years ago
- Linux Memory Cryptographic Keys Extractor☆238Updated last year
- Malicious HTTP traffic explorer☆715Updated 2 years ago
- Random repo of machine learning ideas orchestrated in python☆143Updated 6 years ago
- A framework for BREACH and other compression-based crypto attacks☆229Updated 5 years ago
- defplorex for BlackHat Arsenal☆116Updated 7 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Updated 7 years ago
- ☆93Updated 6 years ago
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,106Updated 3 years ago
- A collection of scripts which may come in handy during your freedom fighting activities.☆406Updated 2 years ago
- The first open source vulnerability scanner for firmwares☆195Updated 8 years ago
- Decept Network Protocol Proxy☆276Updated 2 years ago
- Fancy Bear Source Code☆261Updated 8 years ago
- Data Hacking Project☆777Updated 6 years ago