stealth / tensor-pwnLinks
AI fun
☆27Updated 11 months ago
Alternatives and similar repositories for tensor-pwn
Users that are interested in tensor-pwn are comparing it to the libraries listed below
Sorting:
- A little tool to filter the stranger strings from a binary so you can analyze the good ones☆52Updated 5 months ago
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆84Updated 9 months ago
- Tools for offensive security of NetBackup infrastructures☆43Updated 2 years ago
- MLOps Attack Toolkit☆29Updated 5 months ago
- ☆83Updated last week
- Linux #rootkit and #malware revealer☆31Updated last year
- ☆26Updated last year
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55Updated 9 months ago
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆88Updated 6 months ago
- Automated vulnerability discovery and annotation☆68Updated last year
- A simple tool to create mermaid js markdown charts from CVE IDs and CVE keyword searches.☆47Updated 3 years ago
- Proof-of-concept modular implant platform leveraging v8☆54Updated 11 months ago
- Data Scientists Go To Jupyter☆68Updated 11 months ago
- Golem automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM☆98Updated 7 months ago
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆94Updated 3 months ago
- source code for the offsecml framework☆44Updated last year
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Updated 2 years ago
- FLARE floss applied to all unpacked+dumped samples in Malpedia, pre-processed for further use.☆70Updated last month
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Updated 2 years ago
- The God Name Server☆36Updated 2 weeks ago
- Examine Chrome extensions for security issues☆93Updated 2 months ago
- ☆116Updated 2 years ago
- Dont Gamble with Risk☆14Updated last year
- Tree of Attacks (TAP) Jailbreaking Implementation☆117Updated 2 years ago
- Everything related to YARA☆16Updated 5 months ago
- Userland exec PoC to be used as attack vector technique☆94Updated 3 months ago
- Example agents for the Dreadnode platform☆22Updated last month
- LLM-based automated patch diffing☆91Updated 4 months ago
- Detonate malware on VMs and get logs & detection status☆76Updated last week
- ☆139Updated 6 months ago