cchio / deep-pwningLinks
Metasploit for machine learning.
☆571Updated 2 years ago
Alternatives and similar repositories for deep-pwning
Users that are interested in deep-pwning are comparing it to the libraries listed below
Sorting:
- ☆629Updated 2 years ago
- An evolutionary framework for evading machine learning-based malware classifiers.☆110Updated 3 years ago
- Code for cracking passwords with neural networks☆238Updated 5 years ago
- PoC code from DEF CON 25 presentation☆240Updated 7 years ago
- Data Hacking Project☆778Updated 6 years ago
- ☆93Updated 6 years ago
- Machine Learning for Computer Security☆279Updated 3 years ago
- GyoiThon is a growing penetration test tool using Machine Learning.☆774Updated 2 years ago
- Documentation for the Mechanical Phish.☆235Updated 9 years ago
- A machine learning based social media pen-testing tool☆150Updated 9 years ago
- Example code for our book Introduction to Artificial Intelligence for Security Professionals☆154Updated 6 years ago
- OMEN: Ordered Markov ENumerator - Password Guesser☆324Updated 6 years ago
- The iCTF Framework, presented by Shellphish!☆336Updated 2 years ago
- Aktaion: Open Source ML tool and data samples for Exploit and Phishing Research☆143Updated 6 years ago
- Machine Learning and Security | Using machine learning to detect malicious URLs☆272Updated 3 years ago
- CuckooML: Machine Learning for Cuckoo Sandbox☆148Updated 3 years ago
- A tool to predict vulnerability discovery of binary only programs☆187Updated 8 years ago
- A framework for BREACH and other compression-based crypto attacks☆233Updated 5 years ago
- #AISecurity☆1,512Updated last month
- defplorex for BlackHat Arsenal☆115Updated 8 years ago
- A low to medium interaction honeypot.☆472Updated last year
- Short Course - Applied Machine Learning for Security Informatics☆57Updated 9 years ago
- Detection of malware using dynamic behavior and Windows audit logs☆76Updated 10 years ago
- Limon is a sandbox developed as a research project written in python, which automatically collects, analyzes, and reports on the run time…☆398Updated 9 years ago
- Decept Network Protocol Proxy☆279Updated 2 years ago
- Open Source Threat Intelligence Chat Bot☆322Updated 5 years ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆410Updated 5 years ago
- A tool to retrieve malware directly from the source for security researchers.☆563Updated 8 years ago
- Curated list of tools and resources related to the use of machine learning for cyber security☆1,505Updated 5 years ago
- A collection of scripts which may come in handy during your freedom fighting activities.☆409Updated 2 years ago