Machine learning enabled dropper
☆28May 1, 2023Updated 2 years ago
Alternatives and similar repositories for Deep-Drop
Users that are interested in Deep-Drop are comparing it to the libraries listed below
Sorting:
- Remote code execution in Power Platform connectors via JSON deserialization☆23Mar 30, 2023Updated 2 years ago
- Copy cat model for Proofpoint☆91Apr 30, 2020Updated 5 years ago
- Data Scientists Go To Jupyter☆68Mar 3, 2025Updated 11 months ago
- ☆28Dec 28, 2017Updated 8 years ago
- ☆26Feb 11, 2025Updated last year
- Minimal workflows☆20Mar 19, 2024Updated last year
- Standalone Go implementation of Metasploit's "db_nmap" and "db_import" commands.☆19Nov 6, 2024Updated last year
- ☆10Sep 24, 2021Updated 4 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- terraform deployment for red team☆26Dec 13, 2022Updated 3 years ago
- GoLang Scripting Expert, a repo for template scripts regarding basic golang functions, many with a security focus☆23Jun 22, 2020Updated 5 years ago
- P2P Communications of Named Pipes☆12Dec 11, 2025Updated 2 months ago
- ☆11Jun 9, 2020Updated 5 years ago
- my programming / infosec scratchpad☆11Apr 25, 2023Updated 2 years ago
- source code for the examples and topics from the book☆10Mar 11, 2019Updated 6 years ago
- General research for Dreadnode☆27Jun 17, 2024Updated last year
- ☆28Feb 16, 2022Updated 4 years ago
- This is a v2 version of my first IPMI script, but instead of hardcoding if statements this v2 uses a map function to map a temperature ra…☆11May 13, 2021Updated 4 years ago
- Arxiv + Notion Sync☆20May 12, 2025Updated 9 months ago
- This is the Git repository for the Modern Red Teaming workshop given at SINCON2024.☆12May 23, 2024Updated last year
- Proper Payload Protection Prevents Poor Performance☆76Jul 27, 2022Updated 3 years ago
- Provides a suite of Burp extensions and a maven plugin to automate security tests using BurpSuite.☆24Jul 13, 2018Updated 7 years ago
- Pentester Academy notes and commands from the CRTP/CRTE/PACES courses☆15Apr 29, 2022Updated 3 years ago
- Cisco CallManager User Enumeration☆15Aug 16, 2022Updated 3 years ago
- Cobalt Strike Aggressor Script Collection☆19Mar 30, 2018Updated 7 years ago
- Spoof parent process ID☆13Jan 23, 2019Updated 7 years ago
- Embedded, small and composable Zero-Trust Teamserver made for collaborative Go programs or CLI applications.☆13Jul 10, 2025Updated 7 months ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 2 years ago
- Ransoblin (Ransomware Bokoblin)☆18Oct 4, 2020Updated 5 years ago
- A short scraper looking for a POC of CVE-2024-49112☆14Dec 16, 2024Updated last year
- A utility to inspect, validate, sign and verify machine learning model files.☆66Feb 5, 2025Updated last year
- Web Filter External Enumeration Tool (WebFEET)☆78Aug 24, 2014Updated 11 years ago
- Simple C# for checking for the existence of credential files related to AWS, Microsoft Azure, and Google Compute.☆177Sep 18, 2018Updated 7 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆13Jun 24, 2018Updated 7 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆19Oct 8, 2020Updated 5 years ago
- ☆35Nov 4, 2017Updated 8 years ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆118Feb 7, 2024Updated 2 years ago
- A lot of endpoints for the HackTheBox API.☆15Jul 3, 2020Updated 5 years ago