Machine learning enabled dropper
☆28May 1, 2023Updated 2 years ago
Alternatives and similar repositories for Deep-Drop
Users that are interested in Deep-Drop are comparing it to the libraries listed below
Sorting:
- Remote code execution in Power Platform connectors via JSON deserialization☆23Mar 30, 2023Updated 2 years ago
- Copy cat model for Proofpoint☆91Apr 30, 2020Updated 5 years ago
- Data Scientists Go To Jupyter☆68Mar 3, 2025Updated last year
- Minimal workflows☆21Mar 19, 2024Updated 2 years ago
- Standalone Go implementation of Metasploit's "db_nmap" and "db_import" commands.☆19Nov 6, 2024Updated last year
- Visual Studio (C++) Solution Template for Payloads☆18Oct 30, 2019Updated 6 years ago
- ☆26Feb 11, 2025Updated last year
- ☆28Dec 28, 2017Updated 8 years ago
- Arxiv + Notion Sync☆20May 12, 2025Updated 10 months ago
- ☆18Apr 15, 2024Updated last year
- This is the Git repository for the Modern Red Teaming workshop given at SINCON2024.☆13May 23, 2024Updated last year
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- terraform deployment for red team☆26Dec 13, 2022Updated 3 years ago
- General research for Dreadnode☆26Jun 17, 2024Updated last year
- A utility to inspect, validate, sign and verify machine learning model files.☆67Feb 5, 2025Updated last year
- ☆28Feb 16, 2022Updated 4 years ago
- Shellcode reflective DLL injection in Rust☆27Dec 26, 2025Updated 2 months ago
- source code for the examples and topics from the book☆10Mar 11, 2019Updated 7 years ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆118Feb 7, 2024Updated 2 years ago
- Proper Payload Protection Prevents Poor Performance☆76Jul 27, 2022Updated 3 years ago
- GoLang Scripting Expert, a repo for template scripts regarding basic golang functions, many with a security focus☆22Jun 22, 2020Updated 5 years ago
- Simple C# for checking for the existence of credential files related to AWS, Microsoft Azure, and Google Compute.☆177Sep 18, 2018Updated 7 years ago
- ☆10Sep 24, 2021Updated 4 years ago
- ☆10Sep 24, 2017Updated 8 years ago
- A JupyterLab extension to evaluate the security of your Jupyter environment☆38Jun 27, 2023Updated 2 years ago
- Embedded, small and composable Zero-Trust Teamserver made for collaborative Go programs or CLI applications.☆13Jul 10, 2025Updated 8 months ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆19Oct 8, 2020Updated 5 years ago
- This is a v2 version of my first IPMI script, but instead of hardcoding if statements this v2 uses a map function to map a temperature ra…☆11May 13, 2021Updated 4 years ago
- A cobaltstrike script that integrates DDEAuto Attacks☆63Oct 17, 2017Updated 8 years ago
- malleable profile generator GUI for Havoc☆55Apr 28, 2023Updated 2 years ago
- track your food!☆11Feb 8, 2017Updated 9 years ago
- ☆36Nov 4, 2017Updated 8 years ago
- [Tensorflow] A Game Theoretic approach using GAN for Phishing URL synthesis and detection☆11Nov 14, 2022Updated 3 years ago
- Provides a suite of Burp extensions and a maven plugin to automate security tests using BurpSuite.☆24Jul 13, 2018Updated 7 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆39Nov 20, 2015Updated 10 years ago
- Web Filter External Enumeration Tool (WebFEET)☆78Aug 24, 2014Updated 11 years ago
- my programming / infosec scratchpad☆11Apr 25, 2023Updated 2 years ago
- Persistence via Shell Extensions☆64Aug 4, 2023Updated 2 years ago
- A static page generator for AngularJS written in python☆12Apr 16, 2015Updated 10 years ago