stealth / tensor-pwn
AI fun
☆19Updated this week
Alternatives and similar repositories for tensor-pwn:
Users that are interested in tensor-pwn are comparing it to the libraries listed below
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14Updated last year
- Tools for offensive security of NetBackup infrastructures☆39Updated last year
- self-hosted Azure OSINT tool☆26Updated 5 months ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆20Updated last year
- Linux #rootkit and #malware revealer☆24Updated 7 months ago
- details about DIAL protocol vulnerabilities☆28Updated last year
- ☆24Updated 9 months ago
- Finding sensitive information in the trimmed parts of cropped images☆28Updated 3 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- Qemuno Framework☆24Updated 2 years ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆13Updated 2 months ago
- ☆14Updated last month
- MLOps Attack Toolkit☆16Updated last month
- ☆22Updated last year
- Method of finding interesting domains using keywords + JARMs☆13Updated 2 years ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 7 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆36Updated 10 months ago
- Contains Actual Events and Codes of Threat Groups, APTs, Research Groups☆19Updated 2 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆50Updated last year
- Python tool to find vulnerable AD object and generating csv report☆14Updated 2 years ago
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆74Updated 4 months ago
- Recreation of most of the Raccoon Infostealer's functionality, true to threat intelligence, for safe testing in organizational environmen…☆16Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated 10 months ago
- fully async implementation of Dirkjan's ROADTools☆31Updated last year
- PlasmaPup is designed to help central and departmental IT personnel understand their exposures in Active Directory by showing which accou…☆27Updated 10 months ago
- A simple way to exfiltrate data using spotify API☆18Updated 2 weeks ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆51Updated 10 months ago