cchio / deep-pwningLinks
Metasploit for machine learning.
☆572Updated 2 years ago
Alternatives and similar repositories for deep-pwning
Users that are interested in deep-pwning are comparing it to the libraries listed below
Sorting:
- ☆629Updated 3 years ago
- An evolutionary framework for evading machine learning-based malware classifiers.☆111Updated 3 years ago
- PoC code from DEF CON 25 presentation☆242Updated 7 years ago
- Data Hacking Project☆782Updated 6 years ago
- Code for cracking passwords with neural networks☆242Updated 6 years ago
- Documentation for the Mechanical Phish.☆235Updated 9 years ago
- GyoiThon is a growing penetration test tool using Machine Learning.☆803Updated 2 years ago
- Machine Learning for Computer Security☆281Updated 4 years ago
- ☆93Updated 7 years ago
- The iCTF Framework, presented by Shellphish!☆335Updated 2 years ago
- A tool to predict vulnerability discovery of binary only programs☆187Updated 8 years ago
- OMEN: Ordered Markov ENumerator - Password Guesser☆328Updated 6 years ago
- defplorex for BlackHat Arsenal☆115Updated 8 years ago
- Model extraction attacks on Machine-Learning-as-a-Service platforms.☆354Updated 5 years ago
- Detection of malware using dynamic behavior and Windows audit logs☆76Updated 10 years ago
- Example code for our book Introduction to Artificial Intelligence for Security Professionals☆154Updated 6 years ago
- A framework for BREACH and other compression-based crypto attacks☆236Updated 5 years ago
- A tool to retrieve malware directly from the source for security researchers.☆564Updated 8 years ago
- A library for adversarial classifier evasion☆43Updated 11 years ago
- CuckooML: Machine Learning for Cuckoo Sandbox☆149Updated 3 years ago
- Random repo of machine learning ideas orchestrated in python☆142Updated 7 years ago
- Game-Theoretic Adversarial Machine Learning Library☆59Updated 7 years ago
- Handouts, setup scripts, sources, and solutions for challenges from Hack The Vote CTFs☆236Updated 10 months ago
- ☆280Updated 5 years ago
- Teach you a binary exploitation for great good.☆293Updated 7 years ago
- CTF Writeups☆190Updated 8 years ago
- Machine Learning and Security | Using machine learning to detect malicious URLs☆273Updated 3 years ago
- Docker container with tools for binary reverse engineering and exploitation.☆328Updated 4 years ago
- Files from my DEFCON CTF VM.☆273Updated 9 years ago
- Aktaion: Open Source ML tool and data samples for Exploit and Phishing Research☆143Updated 6 years ago