This project aims to create new tweets and carry out social engineering attacks by using the messages that people sent from social media accounts. Deep learning methods are used in this project. Besides, the model is trained with the social media messages of the people and new messages are created with this model. Malicious links are designed fo…
☆12Dec 16, 2017Updated 8 years ago
Alternatives and similar repositories for SMASH
Users that are interested in SMASH are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Machine Learning Model to detect hidden malwares and phase changing malwares.It predicts the date of the next probable attack of the malw…☆13Apr 30, 2020Updated 5 years ago
- People tracker on the Internet: Learn to track the world, to avoid being traced.☆12Jan 2, 2018Updated 8 years ago
- BAT is a tool to help everyone to securing their web-servers.☆10Mar 29, 2021Updated 4 years ago
- Bruteforce Dictionary Generator☆14Apr 3, 2022Updated 3 years ago
- A python implementation for secure file transfer. Course project: "Cyber Security" (KFUPM-COE451)☆16Oct 18, 2021Updated 4 years ago
- Social Engineering for the Blue Team☆11Feb 1, 2024Updated 2 years ago
- My collection of awesome resources, tools, and other shiny things for cyber security stuffs.☆17Aug 31, 2018Updated 7 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Penetration Test Framwork☆21May 10, 2018Updated 7 years ago
- In-browser GPU-accelerated Generative Adversarial Network trained on Fashion-MNIST dataset (tensorflow + deeplearn.js)☆11Aug 28, 2018Updated 7 years ago
- ☆13Feb 13, 2023Updated 3 years ago
- This is the reconnaissance script I wrote for my OSCP journey☆14Feb 20, 2018Updated 8 years ago
- A Multi-modal Framework for Sentimental Analysis of Meme☆17Jan 29, 2021Updated 5 years ago
- Remove an instance / class of choice from an image and fill out the background automatically using pretrained deep learning models.☆19Sep 23, 2018Updated 7 years ago
- Adversarial Structure Matching for Structured Prediction Tasks☆11Jun 4, 2024Updated last year
- A collection of Covid-19 related threat intelligence and resources.☆19Jul 17, 2020Updated 5 years ago
- ☆46Jul 8, 2023Updated 2 years ago
- ☆12Jul 23, 2022Updated 3 years ago
- G-Surge☆11Feb 7, 2018Updated 8 years ago
- Examples of Generative Adversarial Networks built using torchgan☆12Jun 11, 2019Updated 6 years ago
- Scripts I have written to perform various IT Security admin tasks. From validating findings to performing automated attacks☆20Mar 12, 2025Updated last year
- Some of my experiments targeting adversarial instances☆12May 7, 2017Updated 8 years ago
- Security management in SDN using Reinforcement Learning☆14Dec 8, 2022Updated 3 years ago
- ☆14Nov 18, 2022Updated 3 years ago
- Wordpress.org svn repositories spider☆12Aug 4, 2014Updated 11 years ago
- ☆11Feb 6, 2019Updated 7 years ago
- This is implementation of deep convolutional generative adversarial network in TensorFlow library and I will use it to generate videos.☆10Apr 26, 2017Updated 8 years ago
- Arduino+Si5351 = Antenna/Network Analyzer☆13Feb 10, 2019Updated 7 years ago
- ☆13Oct 14, 2016Updated 9 years ago
- Learning Backtracking Models, ICLR'19☆10Feb 2, 2018Updated 8 years ago
- A fully undetected, hidden, persistent, reverse netcat shell backdoor for Windows.☆25Dec 4, 2020Updated 5 years ago
- Python Script Obfuscator☆10Nov 20, 2014Updated 11 years ago
- An Awesome List for getting started with web archiving☆19Dec 21, 2018Updated 7 years ago
- Installs And Executes Shellcode☆12Jul 26, 2015Updated 10 years ago
- This is automation tool which utilize 2 sub -domain finder and then sort out working sub-domain and finally scan for sub-doamin TAKEOVER.☆11May 6, 2023Updated 2 years ago
- This Is A Python Script That Forwards SMS Messages To A Discord Webhook☆10Feb 22, 2024Updated 2 years ago
- The CyberSecurity Framework (CSF for short) is a local Python3 scripting package which aims directly on Cyber Security auditing, where yo…☆41Oct 28, 2017Updated 8 years ago
- A PyTorch Implementation of Deep Convolutional Generative Adversarial Networks☆12Aug 29, 2018Updated 7 years ago
- ☆10Oct 3, 2019Updated 6 years ago