stealth / tensor-pwnLinks
AI fun
☆26Updated 9 months ago
Alternatives and similar repositories for tensor-pwn
Users that are interested in tensor-pwn are comparing it to the libraries listed below
Sorting:
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Updated last year
- A little tool to filter the stranger strings from a binary so you can analyze the good ones☆52Updated 2 months ago
- Tools for offensive security of NetBackup infrastructures☆42Updated 2 years ago
- Linux #rootkit and #malware revealer☆28Updated last year
- FLARE floss applied to all unpacked+dumped samples in Malpedia, pre-processed for further use.☆62Updated 6 months ago
- ☆116Updated 2 years ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55Updated 6 months ago
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆95Updated last month
- ☆26Updated last year
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆83Updated 4 months ago
- Dont Gamble with Risk☆14Updated last year
- An experimental project exploring the use of Large Language Models (LLMs) to solve HackTheBox machines autonomously.☆172Updated this week
- Automated vulnerability discovery and annotation☆67Updated last year
- A VS Code extension to preview XML nmap output☆44Updated 9 months ago
- Living Under the Land on Linux ~ BSides Belfast 2025☆35Updated last week
- A library and a set of tools for exploiting and communicating with Google's Quick Share devices.☆47Updated 8 months ago
- Data Scientists Go To Jupyter☆67Updated 9 months ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Updated 2 years ago
- ☆135Updated 3 months ago
- Imphash-like calculation on Golang binaries☆49Updated 3 years ago
- ☆19Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Updated 2 years ago
- An Adaptive Misuse Detection System☆45Updated last year
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆13Updated 2 years ago
- source code for the offsecml framework☆43Updated last year
- details about DIAL protocol vulnerabilities☆30Updated 2 years ago
- C2 Active Scanner☆60Updated last year
- ☆64Updated last week
- MLOps Attack Toolkit☆28Updated 3 months ago
- Sandbox samples and monitor them with kunai☆29Updated 5 months ago