k3170makan / PyMLProjects
Random repo of machine learning ideas orchestrated in python
☆142Updated 6 years ago
Alternatives and similar repositories for PyMLProjects:
Users that are interested in PyMLProjects are comparing it to the libraries listed below
- CVE-2017-8759 - A vulnerability in the SOAP WDSL parser.☆173Updated 7 years ago
- ☆84Updated 7 years ago
- Fuzzbunch Python-Wine wrapper☆57Updated 7 years ago
- psychoPATH - hunting file uploads & LFI in the dark. This tool is a customisable payload generator designed for blindly detecting LFI & w…☆141Updated 7 years ago
- An exploit for Apache Struts CVE-2018-11776☆301Updated 6 years ago
- An exploit for Apache Struts CVE-2017-9805☆249Updated 7 years ago
- ☆232Updated 9 years ago
- Tool for checking Whether a domain or its multiple sub-domains are up and running.☆72Updated 6 years ago
- ☆138Updated 7 years ago
- Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆318Updated 6 years ago
- Burp Extender plugin that generates a sitemap of a website using Wayback Machine☆226Updated 6 years ago
- Improved decoder for Burp Suite☆137Updated 3 years ago
- Some scripts and exploits☆143Updated 6 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆384Updated 6 years ago
- ☆128Updated 8 years ago
- ☆191Updated 7 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆123Updated 6 years ago
- Image size issues plugin for Burp Suite☆93Updated 6 years ago
- ☆84Updated 7 years ago
- ☆206Updated 3 years ago
- Working Python test and PoC for CVE-2018-11776, includes Docker lab☆125Updated 6 years ago
- Bash simulator to control a server using PHP system functions.☆102Updated 4 years ago
- A Burp Extension to test applications for vulnerability to the Web Cache Deception attack☆136Updated 3 years ago
- CVE-2018-7600 - Drupal 7.x RCE☆71Updated 6 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆169Updated 7 years ago
- Based on URL and Organization Name, collect the IP Ranges, subdomains using various tools like Amass, subfinder, etc.. And check for upho…☆154Updated 8 months ago
- Python script to exploit java unserialize on t3 (Weblogic)☆61Updated 7 years ago
- Aktaion: Open Source ML tool and data samples for Exploit and Phishing Research☆142Updated 5 years ago
- Extract Sense out of Gibberish stuff☆82Updated 7 years ago
- Automate NMAP Scans and Generate Custom Nessus Policies Automatically☆144Updated 8 years ago