evilsocket / ergoLinks
π§ A tool that makes AI easier.
β296Updated last year
Alternatives and similar repositories for ergo
Users that are interested in ergo are comparing it to the libraries listed below
Sorting:
- π§ π π€ Kitsune is an artificial neural network designed to detect and correlate Twitter profiles with similar behaviours.β244Updated 3 years ago
- π§ π¦ An artificial neural network and API to detect Windows malware, based on Ergo and LIEF.β179Updated 6 years ago
- A medium interaction printer honeypot π―β202Updated 2 years ago
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.β539Updated 3 years ago
- Pattern Extractor for Obfuscated Codeβ299Updated 3 years ago
- A machine learning based social media pen-testing toolβ150Updated 8 years ago
- Quark is a data visualization framework.β219Updated 4 years ago
- Tracking the trackers. Draw connections between scripts and domains on website.β15Updated 4 years ago
- A specialized database server for linear algebra and machine learning.β86Updated 2 years ago
- Decept Network Protocol Proxyβ277Updated 2 years ago
- Script lets you gather malicious software and c&c servers from open source platforms like Malshare, Malcode, Google, Cymon - vxvault, cybβ¦β38Updated 5 years ago
- This repo contains logstash of various honeypotsβ174Updated 5 years ago
- Orc is a post-exploitation framework for Linux written in Bashβ395Updated 5 years ago
- Linux Memory Cryptographic Keys Extractorβ238Updated 2 years ago
- PoC code from DEF CON 25 presentationβ242Updated 7 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMTβ258Updated 4 years ago
- Several PDF analysis reassembled with additional tips and toolsβ329Updated 2 years ago
- A script that automates generation of OpenSSL reverse shellsβ301Updated 4 years ago
- Hamburglar -- collect useful information from urls, directories, and filesβ319Updated 2 years ago
- ph0neutria is a malware zoo builder that sources samples straight from the wild. Everything is stored in Viper for ease of access and manβ¦β300Updated 5 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testingβ356Updated 9 months ago
- AI-based, context-driven network device rankingβ298Updated last year
- Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of relβ¦β419Updated last month
- β221Updated 5 years ago
- WIFI Client Detection - Identify people by assigning a name to a device performing a wireless probe request.β234Updated 4 years ago
- A powerful target reconnaissance framework powered by graph theory.β420Updated 2 years ago
- A malware analysis and classification tool.β190Updated 3 years ago
- GitPwnd is a network penetration tool that lets you use a git repo for command and control of compromised machinesβ145Updated 2 years ago
- Security For Embedeed Systems - One Bin to Rule Them All.β150Updated 6 years ago
- Instruments to assist in binary application reversing and augmentation, geared towards walled gardens like iOS and macOSβ197Updated 5 years ago