tigthor / neural-network-hackingLinks
Hacking the Singularity. Deep learning hacking. Weaponizing AI in Offensive security
β105Updated last year
Alternatives and similar repositories for neural-network-hacking
Users that are interested in neural-network-hacking are comparing it to the libraries listed below
Sorting:
- π Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.shβ33Updated 3 years ago
- An automated e-mail OSINT toolβ24Updated 3 years ago
- BlueTeam, RedTeam, Bug bounty, CTI, OSINT, Threat Hunting, Network and Web Recon, Discovery, Enumeration, Vulnerability Mapping, Exploitaβ¦β54Updated last week
- Pentest/Red Team: Resources, repos and scripts.β78Updated 3 weeks ago
- It was developed to speed up the processes of SOC Analysts during analysisβ47Updated last year
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities lβ¦β50Updated last month
- Fuxsociety Mr Robot 2.1β28Updated 2 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing standβ¦β93Updated 2 months ago
- Retrieve all mails of users related to a git repository, a git user or a git organizationβ57Updated last year
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resourcesβ25Updated 4 years ago
- Basics on commands/tools/info on how to do binary exploitation on a mobile phoneβ56Updated 2 years ago
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Social Enginβ¦β21Updated 3 years ago
- Who We Areβ20Updated last year
- ARP Spoofing Defender is a project designed to protect local networks from ARP Spoofing attacks. ARP Spoofing Defender provides mechanismβ¦β22Updated 2 weeks ago
- Highly configurable script for dictionary/spray attacks against online web applications.β53Updated 3 years ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.β90Updated last year
- AI Powered Terminal Based Ethical Hacking Assistantβ81Updated 10 months ago
- An Interface for AI built for cybersecurity professionalsβ93Updated 9 months ago
- Capture screenshots of onion services on an onion service.β72Updated last year
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious dβ¦β39Updated 2 years ago
- It is a project produced to expose the main logic of OSINT-AI tools offered for sale on the DarkWebβ36Updated last year
- Internal Network Penetration Test Playbookβ20Updated 4 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Toolβ31Updated 2 years ago
- A tool designed to analyse email headersβ38Updated 3 years ago
- Dump place details from Google Maps like phone,email,website,and reviewsβ71Updated 6 months ago
- Automated Pentest Recon Scannerβ14Updated 8 years ago
- Gather and scrape info from the LinkedIn profiles of a company's employees.β28Updated 2 years ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152β20Updated 2 years ago
- Simple Tool for webhackingβ11Updated 2 years ago
- The DNS Hunt will make your life easier, and of course faster.β48Updated 5 years ago