gyoisamurai / GyoiThon
GyoiThon is a growing penetration test tool using Machine Learning.
☆758Updated last year
Alternatives and similar repositories for GyoiThon:
Users that are interested in GyoiThon are comparing it to the libraries listed below
- Source code about machine learning and security.☆1,989Updated 2 years ago
- Network reconnaissance and vulnerability assessment tools.☆397Updated 3 years ago
- Automate creating resilient, disposable, secure and agile infrastructure for Red Teams.☆891Updated 3 years ago
- Vulnerability scanner based on vulners.com search API☆845Updated 9 months ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,257Updated last week
- An information security preparedness tool to do adversarial simulation.☆1,107Updated 5 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆540Updated last year
- Utilities for MITRE™ ATT&CK☆1,015Updated 8 months ago
- Vulnerability Labs for security analysis☆1,164Updated 3 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,105Updated 7 years ago
- Vulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.☆560Updated last year
- The Correlated CVE Vulnerability And Threat Intelligence Database API☆937Updated 3 years ago
- Burp-Automator: A Burp Suite Automation Tool with Slack Integration. It can be used with Jenkins and Selenium to automate Dynamic Applica…☆480Updated 6 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,001Updated 4 years ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆664Updated last year
- ☆1,057Updated 5 years ago
- Red Team Tool Kit☆1,116Updated 2 years ago
- Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of rel…☆417Updated 5 months ago
- Red team Arsenal - An intelligent scanner to detect security vulnerabilities in company's layer 7 assets.☆411Updated last year
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948Updated 5 years ago
- Proof of concept for CVE-2019-0708☆1,177Updated 3 years ago
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,132Updated 2 years ago
- AuthMatrix is a Burp Suite extension that provides a simple way to test authorization in web applications and web services.☆619Updated 10 months ago
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,248Updated 2 years ago
- fireELF - Fileless Linux Malware Framework☆659Updated 5 years ago
- Watchdog - A Comprehensive Security Scanning and a Vulnerability Management Tool.☆415Updated 6 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,206Updated 4 years ago
- WAFNinja is a tool which contains two functions to attack Web Application Firewalls.☆808Updated 7 years ago
- A Python Package for Data Exfiltration☆770Updated 8 months ago
- offsec batteries included☆1,531Updated 10 months ago