kyleeasterly / loose-lips-multipliersLinks
DEF CON 31 AI Village - LLMs: Loose Lips Multipliers
☆10Updated 2 years ago
Alternatives and similar repositories for loose-lips-multipliers
Users that are interested in loose-lips-multipliers are comparing it to the libraries listed below
Sorting:
- HoneyDB Python Module☆14Updated last year
- Central repo for talks and presentations☆46Updated last year
- ☆22Updated 4 years ago
- ☆21Updated last year
- Ansible scripts to build an attack box☆25Updated 7 years ago
- Collection of red machine learning projects☆41Updated 4 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆12Updated 3 years ago
- Data Scientists Go To Jupyter☆67Updated 8 months ago
- LetMeOutOfYour.net Resources☆20Updated 5 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- python wrapper to use tshark for file extraction from the command line.☆26Updated 7 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- ☆14Updated last year
- Conceptual Methods for Finding Commonalities in Macho Files☆12Updated last year
- ☆10Updated 4 years ago
- python3 scripts to help with aws triage needs☆15Updated 3 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Updated 6 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆17Updated 4 years ago
- ☆17Updated 9 months ago
- ☆16Updated 8 years ago
- Provides an overview of the inner file structure of a PDF☆25Updated 3 years ago
- Recordization library☆10Updated 2 weeks ago
- Machine learning enabled dropper☆27Updated 2 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Updated 6 years ago
- An experiment to address digital intelligence archiving on offensive engagements.☆26Updated 5 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 3 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆22Updated 3 years ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Updated 6 years ago
- A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.☆13Updated 8 years ago