gyoisamurai / GyoiThon
GyoiThon is a growing penetration test tool using Machine Learning.
☆763Updated 2 years ago
Alternatives and similar repositories for GyoiThon:
Users that are interested in GyoiThon are comparing it to the libraries listed below
- Vulnerability Labs for security analysis☆1,169Updated 4 years ago
- Source code about machine learning and security.☆2,025Updated 2 years ago
- Network reconnaissance and vulnerability assessment tools.☆399Updated 3 years ago
- Vulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.☆562Updated 2 years ago
- Red team Arsenal - An intelligent scanner to detect security vulnerabilities in company's layer 7 assets.☆412Updated last year
- Proof-of-Concept exploits for CVEs found by the team at Rhino Security Labs☆840Updated 2 weeks ago
- Vulncode-DB project☆577Updated 3 years ago
- WAFNinja is a tool which contains two functions to attack Web Application Firewalls.☆810Updated 7 years ago
- Automate creating resilient, disposable, secure and agile infrastructure for Red Teams.☆900Updated 4 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆726Updated 7 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,267Updated 2 months ago
- Utilities for MITRE™ ATT&CK☆1,025Updated 10 months ago
- The Correlated CVE Vulnerability And Threat Intelligence Database API☆943Updated 3 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆543Updated last year
- From XSS to RCE 2.75 - Black Hat Europe Arsenal 2017 + Extras☆425Updated 5 years ago
- Proof of concept for CVE-2019-0708☆1,183Updated 3 years ago
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,270Updated 3 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆950Updated 5 years ago
- OWASP ZSC - Shellcode/Obfuscate Code Generator https://www.secologist.com/☆653Updated last year
- DejaVU - Open Source Deception Framework☆410Updated 2 years ago
- Red Team Tool Kit☆1,120Updated 2 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆826Updated 7 years ago
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆722Updated 5 years ago
- AuthMatrix is a Burp Suite extension that provides a simple way to test authorization in web applications and web services.☆625Updated last year
- Burp-Automator: A Burp Suite Automation Tool with Slack Integration. It can be used with Jenkins and Selenium to automate Dynamic Applica…☆481Updated 6 years ago
- Collection of commands, tips and tricks and references I found useful during preparation for OSCP exam.☆429Updated 3 years ago
- OWASP Xenotix XSS Exploit Framework is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework.☆529Updated 4 years ago
- kadimus is a tool to check and exploit lfi vulnerability.☆532Updated 4 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,211Updated 4 years ago
- Vulmap Online Local Vulnerability Scanners Project☆965Updated 2 years ago