evilsocket / ergo
π§ A tool that makes AI easier.
β295Updated 8 months ago
Alternatives and similar repositories for ergo:
Users that are interested in ergo are comparing it to the libraries listed below
- π§ π¦ An artificial neural network and API to detect Windows malware, based on Ergo and LIEF.β177Updated 5 years ago
- π§ π π€ Kitsune is an artificial neural network designed to detect and correlate Twitter profiles with similar behaviours.β242Updated 2 years ago
- A specialized database server for linear algebra and machine learning.β86Updated 2 years ago
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.β538Updated 2 years ago
- ph0neutria is a malware zoo builder that sources samples straight from the wild. Everything is stored in Viper for ease of access and manβ¦β301Updated 4 years ago
- Pattern Extractor for Obfuscated Codeβ297Updated 3 years ago
- Decept Network Protocol Proxyβ275Updated 2 years ago
- Script lets you gather malicious software and c&c servers from open source platforms like Malshare, Malcode, Google, Cymon - vxvault, cybβ¦β38Updated 5 years ago
- This repo contains logstash of various honeypotsβ175Updated 5 years ago
- Cosa Nostra, a FOSS graph based malware clusterization toolkit.β229Updated last year
- A powerful target reconnaissance framework powered by graph theory.β420Updated 2 years ago
- Quark is a data visualization framework.β218Updated 4 years ago
- Tracking the trackers. Draw connections between scripts and domains on website.β15Updated 3 years ago
- πCrack hashes using online rainbow & lookup table attack services, right from your terminal.β233Updated 2 years ago
- AI-based, context-driven network device rankingβ295Updated last year
- A script that automates generation of OpenSSL reverse shellsβ300Updated 4 years ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network β¦β664Updated last year
- Linux Memory Cryptographic Keys Extractorβ237Updated last year
- Red team & penetration testing tools to exploit the capabilities of Intel AMTβ257Updated 3 years ago
- Orc is a post-exploitation framework for Linux written in Bashβ395Updated 5 years ago
- A manager for your secrets.β941Updated 7 months ago
- Python-based utility that uses supervised machine learning to detect phishing domains from the Certificate Transparency log network.β325Updated 5 months ago
- Official python API for Phish.AI public and private API to detect zero-day phishing websitesβ172Updated 6 years ago
- generate reverse shell from CLI for linux and Windows.β245Updated 4 years ago
- Nili is a Tool for Network Scan, Man in the Middle, Protocol Reverse Engineering and Fuzzing.β215Updated 5 years ago
- Stop searching for sample hashes on 10 different sites.β66Updated 6 years ago
- Code written as part of our various malware investigationsβ393Updated last month
- Collaborative malware analysis frameworkβ375Updated 6 years ago
- A malware analysis and classification tool.β191Updated 3 years ago
- Low interaction honeypot designed for Android Debug Bridge over TCP/IPβ163Updated 3 months ago