Code repository for "Machine Learning For Red Team Hackers".
☆41Feb 5, 2020Updated 6 years ago
Alternatives and similar repositories for MLforRedTeamHackers
Users that are interested in MLforRedTeamHackers are comparing it to the libraries listed below
Sorting:
- ☆10Nov 24, 2018Updated 7 years ago
- Implementation of USENIX'2024 paper "Racing for TLS Certificate Validation: A Hijacker’s Guide to the Android TLS Galaxy"☆20Apr 4, 2024Updated last year
- ☆17Jun 28, 2023Updated 2 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- A PoC executing shellcode in Dart☆16Jun 28, 2022Updated 3 years ago
- Collected resources for OSWA preparation.☆26Jan 25, 2023Updated 3 years ago
- ☆19Aug 26, 2020Updated 5 years ago
- Linux Post-Exploitation tools wrapper☆20Mar 21, 2023Updated 2 years ago
- A repo containing some stagers and setup scripts for configuring Salt Stack to be a "bad"-ass C2☆18Jan 3, 2020Updated 6 years ago
- ProcExp Driver (Ab)use☆22Dec 28, 2022Updated 3 years ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Dec 6, 2023Updated 2 years ago
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆27Dec 19, 2025Updated 2 months ago
- Vulnerable thick client applications used as examples in the Introduction to Hacking Desktop Applications blog series☆107Jan 9, 2024Updated 2 years ago
- Some of the presentations, workshops, and labs I gave at public conferences.☆34Oct 24, 2025Updated 4 months ago
- Downlaod all the nuclei Templates created from many Bug Hunters☆29May 25, 2023Updated 2 years ago
- ZoomBotC2 is a stealthy Command and Control (C2) framework that leverages Zoom's API endpoints for covert communication between implants …☆56Jun 30, 2025Updated 8 months ago
- Rex Shellcode Loader for AV/EDR evasion☆35Apr 7, 2024Updated last year
- A *very* imperfect attempt to correlate Kernel32 function calls to native API (Nt/Zw) counterparts/execution flow.☆28Dec 16, 2021Updated 4 years ago
- Information Security Information From Web☆28Jul 31, 2025Updated 7 months ago
- Revised shell script for parsing .gnmap, .xml, or .nmap port scan results files to a CSV list, lists of IPs per port, web urls, and a sum…☆13Apr 17, 2020Updated 5 years ago
- ☆10Aug 4, 2020Updated 5 years ago
- Final assignment for the course Data Visualization with Python, part of IBM Data Science Professional Certification on Coursera☆11Jun 22, 2020Updated 5 years ago
- ☆38Mar 28, 2025Updated 11 months ago
- A small and portable Windows C library for sandbox detection☆35Oct 2, 2023Updated 2 years ago
- MiniDump a process in memory with rust☆37Jun 20, 2021Updated 4 years ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆41Jul 9, 2023Updated 2 years ago
- Azure DevOps Services Attack Toolkit☆150Mar 15, 2025Updated 11 months ago
- ☆14Dec 28, 2024Updated last year
- ☆19Sep 12, 2022Updated 3 years ago
- Docker container for running CobaltStrike 4.10☆38Sep 18, 2024Updated last year
- airCross is a tool that takes advantage of API functionality within VMWare's AirWatch MDM solution to perform single-factor authenticatio…☆47Jul 19, 2022Updated 3 years ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- ☆37Oct 3, 2023Updated 2 years ago
- A OWASP Based Checklist With 80+ Test Cases☆156Oct 26, 2022Updated 3 years ago
- ☆42Jul 31, 2024Updated last year
- Minimalist notes for CEH-practical Cert.☆39Jul 19, 2022Updated 3 years ago
- Automate the build of a vulnerable AD environment.☆40Aug 19, 2022Updated 3 years ago
- ☆43Apr 28, 2024Updated last year
- Python3 tool to perform password spraying against Microsoft Online service using various methods☆86Mar 12, 2023Updated 2 years ago