chihebchebbi / Mastering-Machine-Learning-for-Penetration-TestingLinks
Mastering Machine Learning for Penetration Testing, published by Packt
☆27Updated 6 years ago
Alternatives and similar repositories for Mastering-Machine-Learning-for-Penetration-Testing
Users that are interested in Mastering-Machine-Learning-for-Penetration-Testing are comparing it to the libraries listed below
Sorting:
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆26Updated 11 months ago
- A simple script for quickly mining sensitive information in binary files.☆29Updated 4 years ago
- Dataset used in WAF-A-MoLE paper☆8Updated 5 years ago
- ☆11Updated 11 months ago
- ☆29Updated 4 years ago
- Some PoC (Proof-of-Concept) about vulnerability of java deserialization of untrusted data☆26Updated 3 years ago
- Remote Code Execution vulnerability on ArcSight Logger☆20Updated 4 years ago
- 该脚本为Citrix XenMobile 目录遍历漏洞(CVE-2020-8209)批量检测脚本。☆31Updated 4 years ago
- Apache Flink 目录遍历漏洞批量检测 (CVE-2020-17519)☆48Updated 4 years ago
- Explore Indicators of Compromise Automatically☆94Updated 5 years ago
- CVE-2021-3378 | FortiLogger - Unauthenticated Arbitrary File Upload (Metasploit)☆22Updated 4 years ago
- Perform CVE lookup on cvedetails.com☆24Updated last year
- 不定期更新suricata的检测规则☆11Updated 5 years ago
- CVE-2022-22965 poc including reverse-shell support☆13Updated last year
- https://github.com/rshipp/awesome-malware-analysis☆34Updated 4 years ago
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆42Updated 10 months ago
- We publish our challenge questions for everyone.☆94Updated 4 years ago
- Repository of Yara rules created by the Stratosphere team☆26Updated 3 years ago
- Proof of concept code to exploit CVE-2020-12116: Unauthenticated arbitrary file read on ManageEngine OpManger.☆33Updated 5 years ago
- XSS payloads for edge cases☆34Updated 6 years ago
- Burp Suite JSON/JS-Beautifier☆14Updated 5 years ago
- A Python3 module to assist in fuzzing web applications☆57Updated last year
- A Scrapy-based crawler for crawling Exploit Database☆12Updated 6 years ago
- Shmoocon 2019 Firetalk☆22Updated 6 years ago
- None of the exploit code or research is my own but all available in public domain☆28Updated 5 years ago
- Repository collecting and automagically processing public threat intelligence reports.☆18Updated 5 years ago
- A Simple PE File Heuristics Scanners☆49Updated 6 years ago
- ☆43Updated 2 years ago
- static malware analysis and report tool open source version for linux☆17Updated 7 years ago
- 恶意脚本检测分类工具☆40Updated 4 years ago