AI fun
☆27Feb 27, 2025Updated last year
Alternatives and similar repositories for tensor-pwn
Users that are interested in tensor-pwn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- LobotoMl is a set of scripts and tools to assess production deployments of ML services☆10May 16, 2022Updated 3 years ago
- Unofficial Iranian hackers group disk wiper malware aka "Shamoon" in .NET 2.0☆13Dec 23, 2018Updated 7 years ago
- ☆13Jun 15, 2024Updated last year
- AI Security Research☆15Jun 21, 2023Updated 2 years ago
- A detailed list of potentially dangerous file extensions☆18Jun 18, 2025Updated 9 months ago
- Open KLara Project☆36Feb 12, 2026Updated last month
- A collection of sample code used in some experiments with Sliver C2☆16Mar 28, 2023Updated 2 years ago
- Tools that run inside the guest☆11Jan 2, 2020Updated 6 years ago
- Generative web directory fuzzer,crawling and subdomain checker based on chatgpt☆16May 15, 2024Updated last year
- ☆12Aug 10, 2024Updated last year
- CVE-2023-50254: PoC Exploit for Deepin-reader RCE that affects unpatched Deepin Linux Desktops. Deepin Linux's default document reader "d…☆16Dec 22, 2023Updated 2 years ago
- Python emulator for Excel XLM macros.☆18May 25, 2020Updated 5 years ago
- A security-first linter for code that shouldn't need linting☆18Sep 12, 2023Updated 2 years ago
- ☆15May 6, 2021Updated 4 years ago
- ☆10Sep 5, 2022Updated 3 years ago
- A simple way to exfiltrate data using spotify API☆20Feb 11, 2026Updated last month
- ☆21Sep 10, 2024Updated last year
- ☆43Dec 12, 2024Updated last year
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Nov 24, 2023Updated 2 years ago
- A Burp Suite extension for Lightning/Aura framework security testing with advanced action management, context editing, and comprehensive …☆55Mar 2, 2026Updated 3 weeks ago
- ☆30Jan 14, 2026Updated 2 months ago
- Folder Git☆14Nov 16, 2018Updated 7 years ago
- Binary Ninja Plugin for Generating Callgraphs☆17Jun 17, 2025Updated 9 months ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- A framework for finding completeness bugs in optimizing compiler toolchains.☆23Mar 4, 2024Updated 2 years ago
- A community-run reference for state-of-the-art adversarial example defenses.☆52Oct 13, 2024Updated last year
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- Log4j_dos_CVE-2021-45105☆13Dec 19, 2021Updated 4 years ago
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆14May 3, 2024Updated last year
- CERTITUDE - A python package to classify malicious URLs☆20May 16, 2022Updated 3 years ago
- rust implementation of the DAT protocol☆19Jun 2, 2018Updated 7 years ago
- [ACL 2025] LongSafety: Evaluating Long-Context Safety of Large Language Models☆16Jun 18, 2025Updated 9 months ago
- This repo is dedicated to a powerpoint exploit☆34Dec 11, 2020Updated 5 years ago
- Ncurses based hex editor with vi interface (upstream)☆23May 27, 2025Updated 9 months ago
- ☆16Jul 17, 2024Updated last year
- This is a opensource repo about how to detect android malware using Random Forest Classifier and explain it use linearsvc.☆12Feb 7, 2024Updated 2 years ago
- Utilities for processing Wikipedia and Wikidata dumps in Go. Read-only mirror of https://gitlab.com/tozd/go/mediawiki☆13Mar 8, 2026Updated 2 weeks ago
- hook up with an operating or new SSH agent☆20Jan 15, 2018Updated 8 years ago
- ☆17Jan 9, 2025Updated last year