Random repo of machine learning ideas orchestrated in python
☆142Jul 31, 2018Updated 7 years ago
Alternatives and similar repositories for PyMLProjects
Users that are interested in PyMLProjects are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of publicly released whitepapers☆49Sep 1, 2017Updated 8 years ago
- HEVD Multi-Exploit by m_101☆23Jun 24, 2018Updated 7 years ago
- 一个基于lua插件的pcap监控工具。☆27Sep 25, 2017Updated 8 years ago
- collection of evil code☆14Feb 20, 2013Updated 13 years ago
- CVE-2017-8759 - A vulnerability in the SOAP WDSL parser.☆176Sep 14, 2017Updated 8 years ago
- ☆63Mar 21, 2018Updated 8 years ago
- ZipArchive 2.1.4 dir traversal 0-Day☆17Aug 30, 2018Updated 7 years ago
- tool to extract passwords from TeamViewer memory using Frida☆464Jul 17, 2018Updated 7 years ago
- MAC Address Org Auto-Detection☆33May 25, 2017Updated 8 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆729Nov 19, 2017Updated 8 years ago
- Radare 2 wiki☆94Apr 24, 2020Updated 5 years ago
- Running CVE-2017-8759 exploit sample.☆256Jan 23, 2020Updated 6 years ago
- ☆10Jun 1, 2014Updated 11 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆378Oct 12, 2020Updated 5 years ago
- POC for CVE-2018-15685☆42Aug 24, 2018Updated 7 years ago
- ☆13Apr 11, 2018Updated 7 years ago
- A simple exploit to execute system command on codiad☆65Aug 19, 2018Updated 7 years ago
- VMware Escape Exploit before VMware WorkStation 12.5.5☆914Nov 7, 2023Updated 2 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆120Nov 6, 2024Updated last year
- Leverage certificate transparency live feed to monitor for newly issued subdomain certificates (last 90 days, configurable), for domains …☆224Dec 7, 2022Updated 3 years ago
- intercepting kali router☆443Aug 31, 2017Updated 8 years ago
- ☆163Oct 2, 2025Updated 5 months ago
- crawl hackerone reports☆46Apr 2, 2018Updated 7 years ago
- Templates for developing your own listeners and agents for AdaptixC2.☆48Feb 28, 2026Updated 3 weeks ago
- UAC 0day, all day!☆281Jul 30, 2017Updated 8 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- Word 2016 vulnerability allows injecting HTML/JS code into a docx file's embeddedHTML="" tags.☆96Dec 10, 2018Updated 7 years ago
- 对windows-api内容进行自动审查和过滤监控☆15May 30, 2017Updated 8 years ago
- CVE-2017-9791☆27Jul 8, 2017Updated 8 years ago
- The best way to learn Frida, is practicing. This is an example of scripts to use in a practical workshop.☆28Jun 13, 2017Updated 8 years ago
- poc or exp of android vulnerability☆407Dec 30, 2017Updated 8 years ago
- A collection of scripts that run on my web server. Mainly for debugging SSRF, blind XSS, and XXE vulnerabilities.☆549Jun 12, 2017Updated 8 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆96Mar 7, 2018Updated 8 years ago
- Symbolic Execution Tool in r2☆106Jan 21, 2022Updated 4 years ago
- Ruby interface to cirt.net default passwords database☆19May 4, 2011Updated 14 years ago
- Vulnerability Labs for security analysis☆1,170Mar 10, 2021Updated 5 years ago
- A DNS tunnel utilizing the Burp Collaborator☆103Oct 8, 2019Updated 6 years ago
- Improved decoder for Burp Suite☆138Aug 30, 2021Updated 4 years ago
- Node JS code for a set of Alexa voice skills designed to assist hackers and developers with common tasks☆56Mar 6, 2019Updated 7 years ago