stealth / tensor-pwnLinks
AI fun
☆27Updated 11 months ago
Alternatives and similar repositories for tensor-pwn
Users that are interested in tensor-pwn are comparing it to the libraries listed below
Sorting:
- A little tool to filter the stranger strings from a binary so you can analyze the good ones☆52Updated 4 months ago
- Everything related to YARA☆16Updated 5 months ago
- Automated vulnerability discovery and annotation☆68Updated last year
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆88Updated 6 months ago
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆94Updated 3 months ago
- Open KLara Project☆34Updated last month
- Linux #rootkit and #malware revealer☆30Updated last year
- Tools for offensive security of NetBackup infrastructures☆43Updated 2 years ago
- MLOps Attack Toolkit☆29Updated 5 months ago
- Golem automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM☆98Updated 7 months ago
- Cheat sheet to detect and remove linux kernel rootkit☆78Updated last year
- Data Scientists Go To Jupyter☆68Updated 11 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 6 months ago
- A simple tool to create mermaid js markdown charts from CVE IDs and CVE keyword searches.☆47Updated 3 years ago
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆84Updated 9 months ago
- FLARE floss applied to all unpacked+dumped samples in Malpedia, pre-processed for further use.☆70Updated last month
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Updated 2 years ago
- ☆116Updated 2 years ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55Updated 9 months ago
- A modular framework for benchmarking LLMs and agentic strategies on security challenges across HackTheBox, TryHackMe, PortSwigger Labs, C…☆197Updated this week
- Userland exec PoC to be used as attack vector technique☆94Updated 3 months ago
- LLM-based automated patch diffing☆91Updated 4 months ago
- ☆83Updated last week
- A library and a set of tools for exploiting and communicating with Google's Quick Share devices.☆47Updated 10 months ago
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆68Updated 2 years ago
- using ML models for red teaming☆45Updated 2 years ago
- ThingFinder is a tool designed to facilitate searching and analysing code, whether it's source code or compiled binary executables. It pr…☆40Updated last year
- ☆26Updated last year
- Dont Gamble with Risk☆14Updated last year
- https://arxiv.org/abs/2412.02776☆67Updated last year