mbhatt1 / MofosploitView external linksLinks
An attempt at a framework to automate metasploit by making the machine learning modules as plug and play packages. Alpha software and still developing. Essentially a fork of Deep Exploit at https://github.com/13o-bbr-bbq/machine_learning_security/tree/master/DeepExploit.
☆13Jan 31, 2019Updated 7 years ago
Alternatives and similar repositories for Mofosploit
Users that are interested in Mofosploit are comparing it to the libraries listed below
Sorting:
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- 通过使用Fofa,钟馗之眼,Shodan进行数据采集☆25Apr 15, 2021Updated 4 years ago
- 哔哩哔哩(https://www.bilibili.com )读取楼层,发送评论,抢楼,抢沙发☆11Apr 16, 2018Updated 7 years ago
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 7 years ago
- Code repository for experiments in SpecROP paper☆13Sep 3, 2021Updated 4 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Jul 13, 2018Updated 7 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆10Feb 17, 2025Updated 11 months ago
- Converts a PCAP file to a PANDAS or SFRAME data frame☆14Apr 19, 2019Updated 6 years ago
- A script written in python3 to spread blind cross-site scripting payloads on HTTP requests headers☆10Oct 2, 2022Updated 3 years ago
- Monocerus emulator framework☆11Mar 28, 2019Updated 6 years ago
- Interconnect Electronic Medical Records systems to each other and to other systems☆25Jan 25, 2017Updated 9 years ago
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- afl-pytmin is a wrapper of afl-tmin, test case minimizer for American Fuzzy Lop (afl).☆11Apr 14, 2017Updated 8 years ago
- ☆12Jun 8, 2021Updated 4 years ago
- ☆11Jan 23, 2020Updated 6 years ago
- Code Coverage client for DynamoRIO☆12Jan 20, 2019Updated 7 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆13Dec 13, 2021Updated 4 years ago
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- Leonardo-Arduino script and python keylogger for BAD-USB aka Poor Man's RUBBER-DUCKY☆12Aug 14, 2020Updated 5 years ago
- ☆12Jun 20, 2022Updated 3 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- SparkFun Analog to Digital Stereo Converter Breakout - PCM1803A☆10Mar 9, 2015Updated 10 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- ☆13Aug 31, 2024Updated last year
- This project is to test the adversarial training method with TextCNN text classification model.☆12Jul 8, 2021Updated 4 years ago
- Harden Kasm Workspaces deployments with DISA STIGs☆17Nov 17, 2025Updated 2 months ago
- Windows Trollware and Persistence Script☆13Sep 16, 2015Updated 10 years ago
- Pegasus System has been designed by an experienced team of software developers (terkoding) and exploit writers to automate processes so p…☆16Jan 2, 2019Updated 7 years ago
- A tool for automated MITM attacks on SSL connections.☆22May 18, 2012Updated 13 years ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Jul 6, 2019Updated 6 years ago
- Information This tool is for educational purpose only, usage of TheFatRat for attacking targets without prior mutual consent is illegal. …☆16Jan 8, 2021Updated 5 years ago
- Active Directory information dumper via LDAP☆13Mar 5, 2020Updated 5 years ago
- Runtime Runtime-Oriented Programming (ROP) protection☆11Feb 17, 2019Updated 6 years ago
- A simple utility to generate real File and Active Directory activity in lab environments for the purposes of monitoring changes and detec…☆11Dec 4, 2018Updated 7 years ago
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- Exploits for various CVEs☆11Mar 19, 2022Updated 3 years ago
- ☆10Oct 13, 2020Updated 5 years ago
- Integrated MALware Simulator and Emulator☆13Dec 10, 2013Updated 12 years ago
- FACT analysis plug-in that maps software version to cves☆13Nov 14, 2019Updated 6 years ago