stealth / tensor-pwn
AI fun
☆24Updated last month
Alternatives and similar repositories for tensor-pwn:
Users that are interested in tensor-pwn are comparing it to the libraries listed below
- Tools for offensive security of NetBackup infrastructures☆39Updated last year
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14Updated last year
- ☆25Updated 11 months ago
- JA4TScan is an active TCP server fingerprinting tool.☆72Updated 7 months ago
- Recreation of most of the Raccoon Infostealer's functionality, true to threat intelligence, for safe testing in organizational environmen…☆17Updated last year
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆15Updated 3 months ago
- A simple way to exfiltrate data using spotify API☆18Updated last month
- ☆23Updated 2 months ago
- Linux #rootkit and #malware revealer☆24Updated 8 months ago
- Malware Analysis tools☆26Updated 6 months ago
- self-hosted Azure OSINT tool☆29Updated 7 months ago
- FLARE floss applied to all unpacked+dumped samples in Malpedia, pre-processed for further use.☆50Updated 3 weeks ago
- Proof-of-concept modular implant platform leveraging v8☆51Updated last month
- ☆18Updated last year
- Ansible build for Afl++ Frida-Mode☆23Updated 10 months ago
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆24Updated last year
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆44Updated 2 years ago
- The God Name Server☆31Updated 3 weeks ago
- POC for unauthenticated RCE in Aspect Unified Installation Assistant by Aspect Software found in 2021.☆12Updated last year
- details about DIAL protocol vulnerabilities☆28Updated last year
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆27Updated last week
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 8 months ago
- Lena's scripts/code/resources for malware analysis☆26Updated 9 months ago
- A curated list of argument injection vectors☆40Updated 2 months ago
- Cheat sheet to detect and remove linux kernel rootkit☆55Updated 3 months ago
- ☆26Updated 4 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆49Updated this week
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆21Updated last year
- A proof-of-concept re-assembler for reverse VNC traffic.☆25Updated last year
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 2 years ago