☆34Feb 26, 2026Updated last week
Alternatives and similar repositories for ArtificialDiaries
Users that are interested in ArtificialDiaries are comparing it to the libraries listed below
Sorting:
- ☆33Jan 16, 2026Updated last month
- In-the-wild deepfake detection dataset☆13Mar 5, 2025Updated last year
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 8 years ago
- Teensy code to brute force a keylogger's unlock code☆15Sep 5, 2016Updated 9 years ago
- OWASP Web Security Testing Guide RAG system with ChromaDB, MCP for Claude Code☆17Dec 11, 2025Updated 2 months ago
- LLM Supported Attack Scenario Creator from Code Review☆14Oct 22, 2024Updated last year
- ☆11Apr 18, 2018Updated 7 years ago
- CADGMM (PAKDD2020)☆11Jan 2, 2021Updated 5 years ago
- A set of bash scripts for offensive security pentesting. (Machine with Kali reccomended)☆13Sep 30, 2016Updated 9 years ago
- Makes working with OWL ontologies in Java easy by auto-generating classes that wrap OWL instances with a convenient API☆17Jul 20, 2010Updated 15 years ago
- Repository for CoSAI workstream 3, AI Risk Governance☆23Feb 18, 2026Updated 2 weeks ago
- SQL injection detection engine by tokenzing and syntax analysis, like SQLChop☆10May 8, 2017Updated 8 years ago
- OSINT Web Page Finder☆11May 20, 2020Updated 5 years ago
- AI Security Newsletter - A monthly digest of AI security research, insights, reports, upcoming events, and tools & resources☆25Feb 5, 2026Updated last month
- ☆13Jun 1, 2021Updated 4 years ago
- AI Robustness Evaluation System☆36Updated this week
- Architects of AI SAFE². The Universal GRC Operating System for Agentic AI, Non-Human Identities, and Swarm Governance. [Dual License: MIT…☆49Updated this week
- Effective go programming☆13Dec 2, 2015Updated 10 years ago
- programlama-II☆18Feb 7, 2011Updated 15 years ago
- The goal of this repo is to become a benchmark for pentesting☆19Oct 25, 2024Updated last year
- Automatically exported from code.google.com/p/fuzzdb☆14Jun 23, 2015Updated 10 years ago
- python class for api btc-e☆34Jul 3, 2017Updated 8 years ago
- A MCP implementation of Frida that seeks to emulate Cheat Engine functionally to allow for seamless Game Hacking by AI agents☆41Dec 4, 2025Updated 3 months ago
- Veri Yapıları☆16Sep 5, 2011Updated 14 years ago
- ☆21Oct 24, 2012Updated 13 years ago
- Code for the paper "AICrypto: A Comprehensive Benchmark for Evaluating Cryptography Capabilities of Large Language Models"☆27Sep 27, 2025Updated 5 months ago
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15May 23, 2017Updated 8 years ago
- kCFI Documentation☆14Apr 18, 2017Updated 8 years ago
- Tehsat Malware Traffic Generator☆19Jul 10, 2021Updated 4 years ago
- Syn flood implementation with raw sockets.☆13Nov 24, 2014Updated 11 years ago
- C code metamorphic obfuscator☆13Feb 20, 2015Updated 11 years ago
- --- LEGAZY!!! --- Contains code necessary participate in the Scala training course.☆53Jul 31, 2013Updated 12 years ago
- Programlama-1☆18May 18, 2011Updated 14 years ago
- ☆22Dec 16, 2024Updated last year
- A light weight http(s) proxy server in C#.NET☆15Apr 6, 2017Updated 8 years ago
- PoC ActiveX SVG Document Execution☆21Nov 8, 2018Updated 7 years ago
- process monitor for server, auto kill processes consuming high CPU after long time☆17Sep 18, 2014Updated 11 years ago
- I'll post some malware analysis from time to time.☆24Apr 3, 2021Updated 4 years ago
- A small webserver vulnerable to insecure deserialization☆21Nov 30, 2017Updated 8 years ago