qwqoro / ML-Talk
π [Talk] OFFZONE 2022 / ODS Data Halloween 2022: Black-box attacks on ML models + with use of open-source tools
β12Updated last year
Alternatives and similar repositories for ML-Talk:
Users that are interested in ML-Talk are comparing it to the libraries listed below
- Cybersecurity of Machine Learning and Artificial Intelligenceβ71Updated 3 years ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whiβ¦β39Updated 7 months ago
- Data Scientists Go To Jupyterβ62Updated 3 weeks ago
- A security-first linter for code that shouldn't need lintingβ16Updated last year
- A python module for red teams to support the continuous recon of JavaScript files and HTML script blocks in an active web application.β13Updated last year
- Dynamic Labs is an open source tool aimed at red teamers and pentesters for the quick deployment of flexible, transient and cloud-hosted β¦β61Updated last year
- Write-up for the Active Directory Lab I have created for Akerva exhibition stand @ leHACK19 (Paris)β35Updated 5 years ago
- Code repository for "Machine Learning For Red Team Hackers".β32Updated 5 years ago
- A learning and testing environment for web application hacking and pentesting.β26Updated 4 years ago
- Small python script wrapper for automating hashcat commandsβ37Updated 4 years ago
- High signal information security sources Goggle.β67Updated last year
- β18Updated 4 months ago
- Vagrant Files to create a Virtualbox VM for Malware Analysisβ13Updated 3 years ago
- Automate the build of a vulnerable AD environment.β36Updated 2 years ago
- β52Updated 2 weeks ago
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guideβ20Updated 4 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented dataβ¦β29Updated 8 months ago
- Ease and assist the compromise of an Active Directory environment.β29Updated 3 years ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detectionβ27Updated 10 months ago
- Security checks for your researchesβ33Updated 4 years ago
- Application Security pipelinesβ50Updated 2 years ago
- New Framework Red Team Operationsβ17Updated 3 years ago
- A post exploitation framework designed to operate covertly on heavily monitored enviromentsβ7Updated 4 years ago
- Information-Gathering Shell Scriptβ29Updated 4 years ago
- CyberSec Resources: FRAMEWORKS & STANDARDS; Pentesting Audits & Hacking; PURPLE TEAMING, AD, API, web, clouds, CTF, OSINT, Pentest tools,β¦β26Updated 2 years ago
- BLS-Bible is a knowledge-base application that houses a collection of guides and write-ups that BLS uses for our various operations.β27Updated last year
- A web front-end for password cracking and analyticsβ16Updated 6 years ago
- Passive subdomain enumeration tool with http-probe.β33Updated 3 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.β17Updated 5 years ago
- Jumpstart multiple WebSocket servers quicklyβ31Updated 3 years ago