cchio / deep-pwningLinks
Metasploit for machine learning.
☆565Updated 2 years ago
Alternatives and similar repositories for deep-pwning
Users that are interested in deep-pwning are comparing it to the libraries listed below
Sorting:
- An evolutionary framework for evading machine learning-based malware classifiers.☆110Updated 2 years ago
- ☆623Updated 2 years ago
- Data Hacking Project☆777Updated 6 years ago
- PoC code from DEF CON 25 presentation☆242Updated 7 years ago
- A tool to retrieve malware directly from the source for security researchers.☆563Updated 7 years ago
- A machine learning based social media pen-testing tool☆150Updated 8 years ago
- A framework for BREACH and other compression-based crypto attacks☆230Updated 5 years ago
- Tool to gather Threat Intelligence indicators from publicly available sources☆660Updated 6 years ago
- A fully featured backdoor that uses Twitter as a C&C server☆773Updated 4 years ago
- GyoiThon is a growing penetration test tool using Machine Learning.☆766Updated 2 years ago
- Automated Linux evil maid attack☆425Updated 9 years ago
- A fast and modular scanner for Tor exit relays. The canonical repository (including issue tracker) is at https://gitlab.torproject.org/tp…☆457Updated last year
- Files from my DEFCON CTF VM.☆270Updated 8 years ago
- ☆93Updated 6 years ago
- Detection of malware using dynamic behavior and Windows audit logs☆77Updated 9 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆828Updated 7 years ago
- Documentation for the Mechanical Phish.☆233Updated 8 years ago
- An evolutionary knowledge-based fuzzer☆271Updated last year
- OMEN: Ordered Markov ENumerator - Password Guesser☆321Updated 5 years ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆409Updated 5 years ago
- PyShell makes interacting with web-based command injection less painful, emulating the feel of an interactive shell as much as possible.☆253Updated 8 years ago
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,108Updated 3 years ago
- Python low-interaction honeyclient☆1,014Updated last week
- CTF Writeups☆186Updated 7 years ago
- ☆280Updated 5 years ago
- mirror of gera's insecure programming examples | http://community.coresecurity.com/~gera/InsecureProgramming/☆274Updated 4 years ago
- Scoreboard for Capture The Flag competitions.☆169Updated 3 years ago
- Handouts, setup scripts, sources, and solutions for challenges from Hack The Vote CTFs☆235Updated 3 months ago
- A shellcode writing toolkit☆670Updated 3 years ago
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆646Updated 2 months ago