tigthor / neural-network-hackingLinks
Hacking the Singularity. Deep learning hacking. Weaponizing AI in Offensive security
β105Updated last year
Alternatives and similar repositories for neural-network-hacking
Users that are interested in neural-network-hacking are comparing it to the libraries listed below
Sorting:
- π Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.shβ33Updated 3 years ago
- BlueTeam, RedTeam, Bug bounty, CTI, OSINT, Threat Hunting, Network and Web Recon, Discovery, Enumeration, Vulnerability Mapping, Exploitaβ¦β55Updated 3 weeks ago
- It was developed to speed up the processes of SOC Analysts during analysisβ47Updated last year
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing standβ¦β93Updated 4 months ago
- Dump place details from Google Maps like phone,email,website,and reviewsβ71Updated 7 months ago
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resourcesβ25Updated 4 years ago
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.β108Updated 2 years ago
- Pentest/Red Team: Resources, repos and scripts.β79Updated 2 months ago
- It is a project produced to expose the main logic of OSINT-AI tools offered for sale on the DarkWebβ37Updated last year
- Extendable Python script handler for automating penetration testing.β39Updated 2 years ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities lβ¦β49Updated 2 months ago
- Cookie - Phishing - Altri strumenti utili - Rendersi Anonimi nel WEB - Messaggistica Sicuraβ22Updated 9 months ago
- Searches online paste sites for certain search terms which can indicate a possible data breach.β75Updated 4 years ago
- Basics on commands/tools/info on how to do binary exploitation on a mobile phoneβ56Updated 2 years ago
- An automated e-mail OSINT toolβ23Updated 3 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious dβ¦β41Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.β53Updated 3 years ago
- Ded Security Framework is a tool aimed at security professionalsβ35Updated last year
- Who We Areβ21Updated last year
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.β90Updated last year
- Internal Network Penetration Test Playbookβ20Updated 4 years ago
- Elenco di Distro LINUX - WINDOWS - MacOSβ74Updated last year
- Sabonis, a Digital Forensics and Incident Response pivoting toolβ17Updated 3 years ago
- The DNS Hunt will make your life easier, and of course faster.β47Updated 5 years ago
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.β101Updated last year
- ARP Spoofing Defender is a project designed to protect local networks from ARP Spoofing attacks. ARP Spoofing Defender provides mechanismβ¦β23Updated 2 months ago
- A tool designed to analyse email headersβ40Updated 3 years ago
- DNSrecon tool with GUI for Kali Linuxβ60Updated 3 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writteβ¦β28Updated 3 years ago
- Bash script for CTF automating basic enumerationβ42Updated 3 years ago