☆18May 6, 2023Updated 2 years ago
Alternatives and similar repositories for malwareGPT
Users that are interested in malwareGPT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Jul 2, 2023Updated 2 years ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆31Feb 26, 2024Updated 2 years ago
- ☆34Jul 23, 2018Updated 7 years ago
- Python3 library for sophisticated timing attacks using Gaussian Mixture Model.☆22Apr 10, 2022Updated 4 years ago
- Remote code execution in Power Platform connectors via JSON deserialization☆23Mar 30, 2023Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A small example of loading BOFs in Python with pure reflection☆19Jan 26, 2023Updated 3 years ago
- ☆10May 25, 2023Updated 2 years ago
- Leak windows system info through a docx file☆12Feb 23, 2020Updated 6 years ago
- A utility to inspect, validate, sign and verify machine learning model files.☆67Feb 5, 2025Updated last year
- ☆36Mar 6, 2026Updated last month
- Analyze your tryhackme progress!☆12May 27, 2024Updated last year
- initial commit☆44Nov 19, 2024Updated last year
- privilege escalation by piggy-backing user sudo requests☆11Feb 6, 2023Updated 3 years ago
- a simple animal jam brute force password cracker with concurrency☆42Mar 8, 2022Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆24Apr 28, 2024Updated last year
- Are you forwarding DNS traffic to another server for some reason, but want to make sure only queries for certain names are passed? Say no…☆20Oct 16, 2022Updated 3 years ago
- Data Scientists Go To Jupyter☆68Mar 3, 2025Updated last year
- micro-gpt in ASM on the Super Nintendo☆55Feb 12, 2026Updated last month
- Source Code and Usage Samples for the Resources hosted in the NVIDIA AI Enterprise AzureML Registry☆21Aug 7, 2024Updated last year
- A VSCode devcontainer for development of COFF files with batteries included.☆50Jul 10, 2023Updated 2 years ago
- Executables that execute other stuff☆54Jul 6, 2018Updated 7 years ago
- Demo of using WASM to sandbox Plotly execution☆18Mar 30, 2025Updated last year
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55May 7, 2025Updated 11 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Helper script for mangling CS payloads☆51May 5, 2019Updated 6 years ago
- RedSage: A Cybersecurity Generalist LLM (ICLR'26)☆38Updated this week
- Community Eventing and Scripting examples☆19Aug 11, 2025Updated 8 months ago
- Testing POC for use cases☆26Nov 24, 2024Updated last year
- Script that searches through all COM objects for any methods containing a key word of your choosing.☆73Feb 28, 2020Updated 6 years ago
- OWASP Foundation Web Respository☆12Jan 28, 2026Updated 2 months ago
- Files to automatically deploy red team Active Directory test lab☆49May 6, 2022Updated 3 years ago
- Sherlock Discord bot☆19Aug 19, 2024Updated last year
- ☆12Mar 14, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Shellcode execution via x86 inline assembly based on MSVC syntax☆17Apr 26, 2023Updated 2 years ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- ☆30Aug 19, 2020Updated 5 years ago
- An Ansible role for installing Cobalt Strike.☆80Mar 13, 2026Updated 3 weeks ago
- Neuviks Terraform Red Team Workshop☆14Aug 10, 2025Updated 8 months ago
- DoppelGate relies on reading ntdll on disk to grab syscall stubs, and patches these syscall stubs into desired functions to bypass Userla…☆123Mar 25, 2022Updated 4 years ago
- Apple BLE proximity pairing message spoofing☆23Sep 21, 2023Updated 2 years ago