stealth / tensor-pwnLinks
AI fun
☆25Updated 7 months ago
Alternatives and similar repositories for tensor-pwn
Users that are interested in tensor-pwn are comparing it to the libraries listed below
Sorting:
- ☆116Updated 2 years ago
- Data Scientists Go To Jupyter☆66Updated 7 months ago
- Tools for offensive security of NetBackup infrastructures☆41Updated 2 years ago
- A little tool to filter the stranger strings from a binary so you can analyze the good ones☆46Updated 3 weeks ago
- using ML models for red teaming☆44Updated 2 years ago
- An experimental project exploring the use of Large Language Models (LLMs) to solve HackTheBox machines autonomously.☆74Updated last week
- FLARE floss applied to all unpacked+dumped samples in Malpedia, pre-processed for further use.☆59Updated 4 months ago
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Updated last year
- A simple tool to create mermaid js markdown charts from CVE IDs and CVE keyword searches.☆45Updated 2 years ago
- source code for the offsecml framework☆41Updated last year
- HardeningMeter is an open-source Python tool carefully designed to comprehensively assess the security hardening of binaries and systems.☆65Updated 10 months ago
- Automated vulnerability discovery and annotation☆67Updated last year
- MLOps Attack Toolkit☆27Updated last month
- ☆26Updated last year
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆79Updated 2 months ago
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14Updated 2 years ago
- A curated list of argument injection vectors☆41Updated 8 months ago
- Linux #rootkit and #malware revealer☆27Updated last year
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55Updated 4 months ago
- Dont Gamble with Risk☆14Updated last year
- self-hosted Azure OSINT tool☆31Updated 3 months ago
- ☆20Updated last year
- A library and a set of tools for exploiting and communicating with Google's Quick Share devices.☆47Updated 6 months ago
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆77Updated 5 months ago
- Proximity is a MCP security scanner powered with NOVA☆39Updated last week
- Tools that trigger False Positive AV alerts☆51Updated 9 months ago
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆89Updated 6 months ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆23Updated 2 years ago
- ☆56Updated last week
- Imphash-like calculation on Golang binaries☆49Updated 3 years ago