Code repository for "Machine Learning For Red Team Hackers".
☆42Feb 5, 2020Updated 6 years ago
Alternatives and similar repositories for MLforRedTeamHackers
Users that are interested in MLforRedTeamHackers are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆10Nov 24, 2018Updated 7 years ago
- ProcExp Driver (Ab)use☆22Dec 28, 2022Updated 3 years ago
- ☆39Mar 28, 2025Updated last year
- Challenge 1 of The Auror Project - Setup AD Lab automatically☆12Apr 26, 2022Updated 4 years ago
- Linux Post-Exploitation tools wrapper☆20Mar 21, 2023Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Implementation of USENIX'2024 paper "Racing for TLS Certificate Validation: A Hijacker’s Guide to the Android TLS Galaxy"☆19Apr 4, 2024Updated 2 years ago
- A sample web application using Node.js, Express and Angular that is vulnerable to common security vulnerabilities.☆10Jun 15, 2023Updated 2 years ago
- Attempt to grind out the 100 offsec project challenges, conceptualized by github user, @kurogai, at his repo [https://github.com/kurogai/…☆19Jul 16, 2024Updated last year
- Collected resources for OSWA preparation.☆26Jan 25, 2023Updated 3 years ago
- AIBOM Workshop RSA 2024☆15May 20, 2024Updated last year
- CDLS: Proving Knowledge of Committed Discrete Logarithms with Soundness☆11Apr 30, 2026Updated last week
- Damn Vulnerable WordPress Site☆52Feb 24, 2023Updated 3 years ago
- ☆12May 6, 2021Updated 5 years ago
- ☆41Jan 10, 2020Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Vulnerable thick client applications used as examples in the Introduction to Hacking Desktop Applications blog series☆106Jan 9, 2024Updated 2 years ago
- A .Net Core MVC webshell☆11Sep 8, 2018Updated 7 years ago
- ☆14Dec 28, 2024Updated last year
- ☆16Sep 12, 2022Updated 3 years ago
- break link between dll and it file on disk☆12Sep 2, 2024Updated last year
- A small and portable Windows C library for sandbox detection☆36Oct 2, 2023Updated 2 years ago
- A repository for MLSecOps and DevSecOps research and more!☆21Feb 20, 2026Updated 2 months ago
- ☆12Nov 12, 2023Updated 2 years ago
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆29Dec 19, 2025Updated 4 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Windows Post-Exploitation tools wrapper☆12Jun 24, 2024Updated last year
- A Burp Suite extension that converts IP addresses to decimal notation, useful for SSRF bypass and WAF evasion testing. Created by Harshad…☆12Dec 9, 2024Updated last year
- A pwn learning repo containing multiple pwn program codes.☆36Mar 11, 2026Updated last month
- PCAP files are analysed using python. DNS delays, congestion window sizes, through put and good put are calculated.☆12Jul 1, 2015Updated 10 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Aug 6, 2020Updated 5 years ago
- Collection of rules for Static Application Security Testing (SAST) with Semgrep☆12Apr 16, 2025Updated last year
- ZoomBotC2 is a stealthy Command and Control (C2) framework that leverages Zoom's API endpoints for covert communication between implants …☆57Jun 30, 2025Updated 10 months ago
- Research of modifying exported function names at runtime (C/C++, Windows)☆18May 28, 2024Updated last year
- ☆12Sep 29, 2025Updated 7 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Damn Vulnerable ElectronJS App (DVEA)☆18Feb 12, 2026Updated 2 months ago
- Sec-Payloads, It's a collection of multiple types of lists used during security assessments & used for bug bounty hunting or penetration …☆10Nov 17, 2025Updated 5 months ago
- Sphinx theme for NLTK☆16Nov 7, 2021Updated 4 years ago
- Minimalist notes for CEH-practical Cert.☆40Jul 19, 2022Updated 3 years ago
- Linux process injection PoCs☆29Apr 30, 2024Updated 2 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- ☆38Oct 3, 2023Updated 2 years ago