schwartz1375 / ArtificialDiariesView external linksLinks
☆30Feb 5, 2026Updated last week
Alternatives and similar repositories for ArtificialDiaries
Users that are interested in ArtificialDiaries are comparing it to the libraries listed below
Sorting:
- ☆28Jan 16, 2026Updated 3 weeks ago
- In-the-wild deepfake detection dataset☆13Mar 5, 2025Updated 11 months ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 8 years ago
- Makes working with OWL ontologies in Java easy by auto-generating classes that wrap OWL instances with a convenient API☆17Jul 20, 2010Updated 15 years ago
- SQL injection detection engine by tokenzing and syntax analysis, like SQLChop☆10May 8, 2017Updated 8 years ago
- LLM Supported Attack Scenario Creator from Code Review☆14Oct 22, 2024Updated last year
- CADGMM (PAKDD2020)☆11Jan 2, 2021Updated 5 years ago
- ☆11Apr 18, 2018Updated 7 years ago
- A set of bash scripts for offensive security pentesting. (Machine with Kali reccomended)☆13Sep 30, 2016Updated 9 years ago
- OSINT Web Page Finder☆11May 20, 2020Updated 5 years ago
- ☆13Jun 1, 2021Updated 4 years ago
- Injecting failures into BGP.☆10Dec 6, 2015Updated 10 years ago
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆92Updated this week
- Python library for managing Arbor Peakflow SP.☆20May 26, 2016Updated 9 years ago
- Effective go programming☆13Dec 2, 2015Updated 10 years ago
- programlama-II☆18Feb 7, 2011Updated 15 years ago
- The goal of this repo is to become a benchmark for pentesting☆19Oct 25, 2024Updated last year
- Syn flood implementation with raw sockets.☆13Nov 24, 2014Updated 11 years ago
- C code metamorphic obfuscator☆13Feb 20, 2015Updated 10 years ago
- Source code of "TRAP: Targeted Random Adversarial Prompt Honeypot for Black-Box Identification", ACL2024 (findings)☆14Nov 20, 2024Updated last year
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15May 23, 2017Updated 8 years ago
- kCFI Documentation☆14Apr 18, 2017Updated 8 years ago
- ☆21Oct 24, 2012Updated 13 years ago
- Tehsat Malware Traffic Generator☆19Jul 10, 2021Updated 4 years ago
- Veri Yapıları☆16Sep 5, 2011Updated 14 years ago
- Programlama-1☆18May 18, 2011Updated 14 years ago
- HackTheWeb is a production-ready, AI-powered web application penetration testing tool designed for security professionals and ethical hac…☆28Oct 5, 2025Updated 4 months ago
- ☆22Dec 16, 2024Updated last year
- PoC ActiveX SVG Document Execution☆21Nov 8, 2018Updated 7 years ago
- process monitor for server, auto kill processes consuming high CPU after long time☆17Sep 18, 2014Updated 11 years ago
- A small webserver vulnerable to insecure deserialization☆20Nov 30, 2017Updated 8 years ago
- I'll post some malware analysis from time to time.☆24Apr 3, 2021Updated 4 years ago
- Checks if out-of-bailiwick hostnames of a zone are resolvable☆18Dec 19, 2022Updated 3 years ago
- ☆47Jan 20, 2026Updated 3 weeks ago
- Akgulyzer; komut satiri rastgele metin uretici ve encoder.☆20Feb 10, 2015Updated 11 years ago
- Locker Decrypter - Python tool to decrypt files encrypted by Locker malware☆19Jun 8, 2015Updated 10 years ago
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆24Dec 16, 2021Updated 4 years ago
- Monitor the execution status of the processes in windows platform.☆35Dec 18, 2013Updated 12 years ago