tigthor / neural-network-hackingLinks
Hacking the Singularity. Deep learning hacking. Weaponizing AI in Offensive security
☆105Updated last year
Alternatives and similar repositories for neural-network-hacking
Users that are interested in neural-network-hacking are comparing it to the libraries listed below
Sorting:
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated last year
- Pentest/Red Team: Resources, repos and scripts.☆78Updated last week
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- Ded Security Framework is a tool aimed at security professionals☆36Updated last year
- Who We Are☆20Updated last year
- It is a project produced to expose the main logic of OSINT-AI tools offered for sale on the DarkWeb☆36Updated last year
- A tool designed to analyse email headers☆38Updated 3 years ago
- ARP Spoofing Defender is a project designed to protect local networks from ARP Spoofing attacks. ARP Spoofing Defender provides mechanism…☆21Updated last year
- An automated e-mail OSINT tool☆24Updated 3 years ago
- Retrieve all mails of users related to a git repository, a git user or a git organization☆55Updated last year
- Dump place details from Google Maps like phone,email,website,and reviews☆70Updated 5 months ago
- Elenco di Distro LINUX - WINDOWS - MacOS☆72Updated last year
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆101Updated last year
- Red Teaming Tactics and Techniques☆13Updated 3 years ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆50Updated last week
- BlueTeam, RedTeam, Bug bounty, CTI, OSINT, Threat Hunting, Network and Web Recon, Discovery, Enumeration, Vulnerability Mapping, Exploita…☆54Updated 7 months ago
- This is a working variant of the Mirai IOT botnet☆14Updated 3 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 3 weeks ago
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆56Updated 2 years ago
- AI Powered Terminal Based Ethical Hacking Assistant☆82Updated 9 months ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated 2 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆92Updated 2 months ago
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆111Updated 2 years ago
- Fuxsociety Mr Robot 2.1☆28Updated 2 years ago
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Social Engin…☆20Updated 3 years ago
- What is Phone Track? So phonetrack is a type of OSINT that is used to track someone's location just based on their telephone number☆79Updated 2 years ago
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resources☆25Updated 4 years ago
- Ransomware groups posts☆42Updated this week
- Extendable Python script handler for automating penetration testing.☆40Updated 2 years ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆59Updated last year