ortegaalfredo / aiTransLinks
Multi-language transpiler (source-to-source compiler) using AI
☆25Updated 2 years ago
Alternatives and similar repositories for aiTrans
Users that are interested in aiTrans are comparing it to the libraries listed below
Sorting:
- Fuzz Network Traffic☆18Updated 6 months ago
- A utility that can be used to launch an executable with a DLL injected☆20Updated last year
- ☆25Updated last year
- Multiplatform multithread efficient stream rust ransomware☆16Updated 3 years ago
- Checks SSL/TLS certificates for potential malicious connections by detecting and blocking certificates used by botnet command and control…☆35Updated last year
- Examples how to use a Assm (Assembly) in a go.☆18Updated 2 months ago
- A C# Tool to gather information about email breaches☆14Updated last year
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆12Updated last year
- Encrypt your git repo...☆48Updated 3 years ago
- A simple reverse ssh/proxy implant PoC for *nix systems.☆54Updated last year
- A command based package for simple display of statistics☆23Updated 7 months ago
- ☆16Updated 10 months ago
- Static analysis tool that detects potential ransomware in PE and ELF files through heuristic analysis☆18Updated last year
- A Simple CVE-2022-39299 PoC exploit generator to bypass authentication in SAML SSO Integrations using vulnerable versions of passport-sam…☆19Updated 2 years ago
- Hacky linux memory probe. Yara or Regex scan process memory☆11Updated last month
- ALPChecker - a tool to detect spoofing and blinding attacks on the ALPC interaction☆13Updated 2 years ago
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆49Updated last year
- ☆15Updated 3 years ago
- Dump Linux keyrings☆20Updated last year
- ☆17Updated 9 months ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆24Updated 2 years ago
- ZTE F660 Routers Authentication Bypass Leading to RCE.☆19Updated last year
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- ☆18Updated 6 months ago
- Volatility 3 plugins to extract a module as complete as possible☆12Updated 2 years ago
- roundrobin with configurable rotating strategies☆13Updated last year
- A mechanism that trampoline hooks functions in x86/x64 systems.☆22Updated 9 months ago
- A distributed network mapper/security scanner.☆16Updated 2 years ago
- Tool for profiling heap usage and memory management☆27Updated 3 years ago
- Go library to allow native inline hooking in windows at runtime☆14Updated last year