cchio / deep-pwning
Metasploit for machine learning.
☆554Updated last year
Related projects: ⓘ
- ☆607Updated last year
- An evolutionary framework for evading machine learning-based malware classifiers.☆107Updated 2 years ago
- Data Hacking Project☆768Updated 5 years ago
- PoC code from DEF CON 25 presentation☆239Updated 6 years ago
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆635Updated last month
- A tool to predict vulnerability discovery of binary only programs☆186Updated 7 years ago
- Documentation for the Mechanical Phish.☆229Updated 8 years ago
- A tool to retrieve malware directly from the source for security researchers.☆562Updated 7 years ago
- Files from my DEFCON CTF VM.☆267Updated 8 years ago
- ☆93Updated 5 years ago
- Model extraction attacks on Machine-Learning-as-a-Service platforms.☆342Updated 3 years ago
- Official repository for Pyew.☆382Updated 5 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆817Updated 6 years ago
- Example code for our book Introduction to Artificial Intelligence for Security Professionals☆149Updated 5 years ago
- A machine learning based social media pen-testing tool☆144Updated 7 years ago
- Free Malware Training Datasets for Machine Learning☆220Updated 3 years ago
- Handouts, setup scripts, sources, and solutions for challenges from Hack The Vote CTFs☆216Updated 3 months ago
- Limon is a sandbox developed as a research project written in python, which automatically collects, analyzes, and reports on the run time…☆387Updated 8 years ago
- Tool to gather Threat Intelligence indicators from publicly available sources☆653Updated 5 years ago
- Brosec - An interactive reference tool to help security professionals utilize useful payloads and commands.☆354Updated last year
- DARPA Cyber Grand Challenge Sample Challenges☆312Updated 6 years ago
- Detection of malware using dynamic behavior and Windows audit logs☆77Updated 9 years ago
- Netzob: Protocol Reverse Engineering, Modeling and Fuzzing☆758Updated 5 months ago
- The iCTF Framework, presented by Shellphish!☆329Updated last year
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆410Updated 4 years ago
- A tool to help you write binary exploits☆603Updated 5 years ago
- A colleciton of CTF write-ups all using pwntools☆495Updated 7 years ago
- A shellcode writing toolkit☆659Updated 2 years ago
- The Damn Vulnerable Router Firmware Project☆667Updated 3 years ago
- A framework for Backdoor development!☆437Updated 6 years ago