Hacking the Singularity. Deep learning hacking. Weaponizing AI in Offensive security
☆105Jun 24, 2024Updated last year
Alternatives and similar repositories for neural-network-hacking
Users that are interested in neural-network-hacking are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆24Feb 7, 2025Updated last year
- Burp Suite Extensions☆12Oct 19, 2021Updated 4 years ago
- ☆25Jan 11, 2023Updated 3 years ago
- My Favorite Offensive Security Scripts☆89Apr 25, 2025Updated last year
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- offensive security scripts and documentation☆30Mar 9, 2026Updated 2 months ago
- A set of recipes useful in pentesting and red teaming scenarios☆148Jul 7, 2023Updated 2 years ago
- ☆39Dec 14, 2024Updated last year
- ☆11May 28, 2022Updated 3 years ago
- Automate installation of extra pentest tools on Kali Linux☆43Jan 4, 2021Updated 5 years ago
- Exploits for CVE-2023-27327 and CVE-2023-27328☆14May 9, 2023Updated 2 years ago
- Red Team tools, infrastructure, and hardware weaponized☆113Apr 17, 2026Updated 3 weeks ago
- Windows Antivirus Evasion and Memory Injection☆12Feb 19, 2022Updated 4 years ago
- POC for a basic C2 server using the python aiohttp framework☆15Mar 22, 2020Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆12Jun 22, 2022Updated 3 years ago
- اداة تقوم بالتخمين على اللوحات والشل اتمنى ان ينال على اعجابكم☆12Sep 8, 2019Updated 6 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆32May 18, 2022Updated 3 years ago
- ☆38Apr 7, 2023Updated 3 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Stock Management System v1.0 al…☆21Mar 30, 2021Updated 5 years ago
- Offensive penetration testing. Perform multiple attack types against web applications, vulnerable programs and OSes in predefined and saf…☆26Aug 14, 2020Updated 5 years ago
- Maltego Transforms for generating screenshots from Websites and URLs☆16Apr 24, 2023Updated 3 years ago
- HACKING BOT is an automated bug bounty tool that streamlines security testing by running multiple cybersecurity tools in parallel. It all…☆21Mar 6, 2025Updated last year
- Free training course offered at Hack Space Con 2023☆138Apr 13, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Nim Shellcode Injector☆15Jan 24, 2021Updated 5 years ago
- WebDirScan is a tool for brute-forcing URIs (directories and files) on web servers by taking input directory to scan for files & director…☆11Mar 31, 2023Updated 3 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆17Dec 9, 2017Updated 8 years ago
- Sniffcon has a wide list of powerful online bug bounty tools which can be used to find security vulnerabilities.☆42Apr 10, 2023Updated 3 years ago
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated last year
- CEH Practical Exam☆19Dec 29, 2020Updated 5 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Feb 6, 2022Updated 4 years ago
- Materials for the workshop "Red Team Ops: Havoc 101"☆399Oct 6, 2024Updated last year
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆12Jul 19, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Simple Bash Script For Collecting Wordpress Username☆20Feb 28, 2021Updated 5 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆66Mar 6, 2024Updated 2 years ago
- Cell ID Coordinates is a Python Script to fetch Location Data(Latitude, Longitude) of Cell Towers☆14Dec 10, 2019Updated 6 years ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆74Oct 28, 2023Updated 2 years ago
- CVE-2022-32119 - Arox-Unrestricted-File-Upload☆17Dec 20, 2023Updated 2 years ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Jul 15, 2024Updated last year
- A Ble Fingerprint Sniffer based on SDR.☆19May 13, 2020Updated 5 years ago