tigthor / neural-network-hackingLinks
Hacking the Singularity. Deep learning hacking. Weaponizing AI in Offensive security
☆97Updated 11 months ago
Alternatives and similar repositories for neural-network-hacking
Users that are interested in neural-network-hacking are comparing it to the libraries listed below
Sorting:
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 3 years ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆89Updated last year
- A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.☆48Updated 2 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated last year
- Pentest/Red Team: Resources, repos and scripts.☆69Updated this week
- Capture screenshots of onion services on an onion service.☆49Updated 11 months ago
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- Collection of scripts and other content to make the life of bots and script-kiddies as hard as possible☆46Updated last year
- It is a project produced to expose the main logic of OSINT-AI tools offered for sale on the DarkWeb☆34Updated last year
- BlueTeam, RedTeam, Bug bounty, CTI, OSINT, Threat Hunting, Network and Web Recon, Discovery, Enumeration, Vulnerability Mapping, Exploita…☆53Updated 2 months ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆135Updated last year
- An Interface for AI built for cybersecurity professionals☆91Updated 3 months ago
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.☆103Updated last year
- AI Powered Terminal Based Ethical Hacking Assistant☆67Updated 4 months ago
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resources☆23Updated 4 years ago
- Web Path Finder☆60Updated last year
- Chrome extension tool for OSINT & Recon☆53Updated last year
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆63Updated last year
- List of Command&Control (C2) software☆40Updated 2 years ago
- A tool designed to analyse email headers☆34Updated 2 years ago
- HackersPlayground—a curated collection of cybersecurity resources, tools, and methodologies for penetration testers.☆24Updated 2 months ago
- Solid Python toolkit for those in the security industry. Some by me, most by smarter people.☆57Updated 4 months ago
- Ransomware groups posts☆39Updated this week
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆90Updated last year
- Crawls URL to get a better image of what is tied to a website.☆33Updated last year
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆31Updated 2 years ago
- Internal Network Penetration Test Playbook☆20Updated 3 years ago
- A simple pentest container equipped with common python pentest tools.☆41Updated 3 months ago
- A list of transforms for searching Red, Yellow, and UNSC notices by Name or Phrase.☆24Updated last year
- Limbo is a Python-based malware that collects sensitive data from a user's computer, such as passwords and system information. It is int…☆48Updated last year