stealth / tensor-pwnLinks
AI fun
☆25Updated 4 months ago
Alternatives and similar repositories for tensor-pwn
Users that are interested in tensor-pwn are comparing it to the libraries listed below
Sorting:
- This repository contains the pre-joining training materials given to aspiring researchers on the Vulnerability Researcher Development Pro…☆76Updated last month
- Automated vulnerability discovery and annotation☆67Updated 11 months ago
- Tools for offensive security of NetBackup infrastructures☆41Updated 2 years ago
- Linux #rootkit and #malware revealer☆26Updated 11 months ago
- ☆26Updated last year
- Proof-of-concept modular implant platform leveraging v8☆53Updated 4 months ago
- self-hosted Azure OSINT tool☆31Updated 3 weeks ago
- MLOps Attack Toolkit☆19Updated 2 weeks ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆53Updated 2 months ago
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14Updated 2 years ago
- ☆115Updated 2 years ago
- Leverages B64 chunks to split files and save to clipboard☆26Updated 2 months ago
- Qemuno Framework☆24Updated 2 years ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15Updated last year
- HardeningMeter is an open-source Python tool carefully designed to comprehensively assess the security hardening of binaries and systems.☆63Updated 7 months ago
- ☆20Updated last year
- FLARE floss applied to all unpacked+dumped samples in Malpedia, pre-processed for further use.☆57Updated last month
- ☆16Updated 2 months ago
- python3 scripts to help with aws triage needs☆15Updated 3 years ago
- Covert data exfiltration via DNS☆47Updated 5 months ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆22Updated last year
- Dont Gamble with Risk☆14Updated last year
- A PoC exploit for CVE-2022-41622 - a CSRF in F5 BIG-IP control plane that leads to remote root☆21Updated 2 years ago
- An experimental project exploring the use of Large Language Models (LLMs) to solve HackTheBox machines autonomously.☆57Updated 2 months ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated last year
- Java archive implant toolkit.☆61Updated 2 months ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- using ML models for red teaming☆43Updated last year
- A curated list of argument injection vectors☆41Updated 5 months ago
- Recreation of most of the Raccoon Infostealer's functionality, true to threat intelligence, for safe testing in organizational environmen…☆19Updated last year