evilsocket / ergoLinks
π§ A tool that makes AI easier.
β300Updated last year
Alternatives and similar repositories for ergo
Users that are interested in ergo are comparing it to the libraries listed below
Sorting:
- π§ π π€ Kitsune is an artificial neural network designed to detect and correlate Twitter profiles with similar behaviours.β244Updated 3 years ago
- Quark is a data visualization framework.β220Updated last week
- Pattern Extractor for Obfuscated Codeβ300Updated 3 years ago
- A medium interaction printer honeypot π―β202Updated 2 years ago
- Tracking the trackers. Draw connections between scripts and domains on website.β16Updated 4 years ago
- π§ π¦ An artificial neural network and API to detect Windows malware, based on Ergo and LIEF.β181Updated 6 years ago
- Hamburglar -- collect useful information from urls, directories, and filesβ319Updated 2 years ago
- This repo contains logstash of various honeypotsβ174Updated 5 years ago
- Script lets you gather malicious software and c&c servers from open source platforms like Malshare, Malcode, Google, Cymon - vxvault, cybβ¦β39Updated 5 years ago
- A machine learning based social media pen-testing toolβ151Updated 8 years ago
- A specialized database server for linear algebra and machine learning.β86Updated 2 years ago
- Linux Memory Cryptographic Keys Extractorβ238Updated 2 years ago
- A powerful target reconnaissance framework powered by graph theory.β421Updated 2 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.β153Updated 4 years ago
- Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of relβ¦β421Updated 2 weeks ago
- A script that automates generation of OpenSSL reverse shellsβ302Updated 5 years ago
- ph0neutria is a malware zoo builder that sources samples straight from the wild. Everything is stored in Viper for ease of access and manβ¦β300Updated 5 years ago
- Decept Network Protocol Proxyβ277Updated 2 years ago
- Orc is a post-exploitation framework for Linux written in Bashβ397Updated 5 years ago
- AI-based, context-driven network device rankingβ300Updated last year
- WIFI Client Detection - Identify people by assigning a name to a device performing a wireless probe request.β237Updated 4 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testingβ357Updated last month
- GitPwnd is a network penetration tool that lets you use a git repo for command and control of compromised machinesβ145Updated 2 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMTβ258Updated 4 years ago
- A portable reverse engineering environment using docker.β211Updated 7 years ago
- β οΈWARNING: This project now become part of https://github.com/j3ssie/Metabigor projectβ177Updated 6 years ago
- Modern Web Firewall: stop account takeovers, weak passwords, cloud IPs, DoS attacks, disposable emailsβ120Updated 3 years ago
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.β539Updated 3 years ago
- The Swiss Army knife for backend engineers.β96Updated 4 years ago
- An experimental project to demonstrate how a user keyboard input may be sniffed through the pattern analysis of the sounds emitted by theβ¦β67Updated 9 years ago