stealth / tensor-pwn
AI fun
☆25Updated 2 months ago
Alternatives and similar repositories for tensor-pwn
Users that are interested in tensor-pwn are comparing it to the libraries listed below
Sorting:
- Linux #rootkit and #malware revealer☆25Updated 9 months ago
- Tools for offensive security of NetBackup infrastructures☆40Updated last year
- An Adaptive Misuse Detection System☆38Updated 6 months ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 9 months ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆16Updated 4 months ago
- ☆16Updated 2 weeks ago
- ☆26Updated last year
- Data Scientists Go To Jupyter☆63Updated 2 months ago
- Cheat sheet to detect and remove linux kernel rootkit☆58Updated 4 months ago
- FLARE floss applied to all unpacked+dumped samples in Malpedia, pre-processed for further use.☆50Updated 2 months ago
- A library and a set of tools for exploiting and communicating with Google's Quick Share devices.☆40Updated last month
- self-hosted Azure OSINT tool☆30Updated 8 months ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆21Updated last year
- Recreation of most of the Raccoon Infostealer's functionality, true to threat intelligence, for safe testing in organizational environmen…☆17Updated last year
- MLOps Attack Toolkit☆16Updated 4 months ago
- A simple way to exfiltrate data using spotify API☆18Updated last week
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14Updated 2 years ago
- Malware Analysis tools☆26Updated 8 months ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆26Updated last week
- Dont Gamble with Risk☆14Updated last year
- CLI Search for Security Operators of MITRE ATT&CK URLs☆16Updated 2 years ago
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆57Updated last year
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆29Updated 2 years ago
- The God Name Server☆31Updated 3 weeks ago
- Golang Shlyuz Implant Implementation☆12Updated 2 years ago
- FireProx written in Go☆19Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated 2 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆42Updated 6 months ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆76Updated last year
- ☆19Updated last year