Code repository for "Machine Learning For Red Team Hackers".
☆40Feb 5, 2020Updated 6 years ago
Alternatives and similar repositories for MLforRedTeamHackers
Users that are interested in MLforRedTeamHackers are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆10Nov 24, 2018Updated 7 years ago
- A PoC executing shellcode in Dart☆14Jun 28, 2022Updated 3 years ago
- ProcExp Driver (Ab)use☆22Dec 28, 2022Updated 3 years ago
- OSED Practice binary☆26Nov 23, 2023Updated 2 years ago
- ☆38Mar 28, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Hands-On Machine Learning for Cybersecurity, published by Packt☆202Jan 18, 2023Updated 3 years ago
- Machine Learning for Cybersecurity Cookbook, published by Packt☆374May 1, 2023Updated 2 years ago
- Challenge 1 of The Auror Project - Setup AD Lab automatically☆12Apr 26, 2022Updated 3 years ago
- Linux Post-Exploitation tools wrapper☆20Mar 21, 2023Updated 3 years ago
- IT Risk Management tools☆14Apr 4, 2025Updated last year
- Implementation of USENIX'2024 paper "Racing for TLS Certificate Validation: A Hijacker’s Guide to the Android TLS Galaxy"☆19Apr 4, 2024Updated 2 years ago
- A collection of exploits or general scripts that often come in handy during CTFs☆10Apr 29, 2020Updated 5 years ago
- Collected resources for OSWA preparation.☆26Jan 25, 2023Updated 3 years ago
- ☆17Jun 28, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆40Jan 10, 2020Updated 6 years ago
- Vulnerable thick client applications used as examples in the Introduction to Hacking Desktop Applications blog series☆105Jan 9, 2024Updated 2 years ago
- A .Net Core MVC webshell☆11Sep 8, 2018Updated 7 years ago
- ☆14Dec 28, 2024Updated last year
- ☆16Sep 12, 2022Updated 3 years ago
- break link between dll and it file on disk☆11Sep 2, 2024Updated last year
- A small and portable Windows C library for sandbox detection☆36Oct 2, 2023Updated 2 years ago
- ☆12Nov 12, 2023Updated 2 years ago
- PowerShell script to bypass UAC using DCCW☆19Jul 29, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆28Dec 19, 2025Updated 4 months ago
- A Burp Suite extension that converts IP addresses to decimal notation, useful for SSRF bypass and WAF evasion testing. Created by Harshad…☆11Dec 9, 2024Updated last year
- PCAP files are analysed using python. DNS delays, congestion window sizes, through put and good put are calculated.☆12Jul 1, 2015Updated 10 years ago
- Collection of rules for Static Application Security Testing (SAST) with Semgrep☆12Apr 16, 2025Updated last year
- ZoomBotC2 is a stealthy Command and Control (C2) framework that leverages Zoom's API endpoints for covert communication between implants …☆57Jun 30, 2025Updated 9 months ago
- Research of modifying exported function names at runtime (C/C++, Windows)☆18May 28, 2024Updated last year
- ☆10May 4, 2016Updated 9 years ago
- ☆19Aug 26, 2020Updated 5 years ago
- ☆12Sep 29, 2025Updated 6 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Damn Vulnerable ElectronJS App (DVEA)☆17Feb 12, 2026Updated 2 months ago
- Sec-Payloads, It's a collection of multiple types of lists used during security assessments & used for bug bounty hunting or penetration …☆10Nov 17, 2025Updated 5 months ago
- A curated list of cyber security resources that I find useful and/or entertaining. Includes: Twitter accounts, podcasts, news sources, an…☆22Jan 18, 2018Updated 8 years ago
- ☆37Oct 3, 2023Updated 2 years ago
- A OWASP Based Checklist With 80+ Test Cases☆169Oct 26, 2022Updated 3 years ago
- Identify and exploit leaked handles for local privilege escalation.☆111Jun 19, 2023Updated 2 years ago
- Rust crate to obfuscate strings and byte arrays so they are not in memory when not in use.☆21Updated this week