tigthor / neural-network-hackingLinks
Hacking the Singularity. Deep learning hacking. Weaponizing AI in Offensive security
☆99Updated last year
Alternatives and similar repositories for neural-network-hacking
Users that are interested in neural-network-hacking are comparing it to the libraries listed below
Sorting:
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 3 years ago
- It is a project produced to expose the main logic of OSINT-AI tools offered for sale on the DarkWeb☆34Updated last year
- BlueTeam, RedTeam, Bug bounty, CTI, OSINT, Threat Hunting, Network and Web Recon, Discovery, Enumeration, Vulnerability Mapping, Exploita…☆54Updated 3 months ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆90Updated last year
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated last year
- Pentest/Red Team: Resources, repos and scripts.☆71Updated 2 weeks ago
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆53Updated 2 years ago
- AI Powered Terminal Based Ethical Hacking Assistant☆70Updated 5 months ago
- Capture screenshots of onion services on an onion service.☆49Updated last year
- Gather and scrape info from the LinkedIn profiles of a company's employees.☆27Updated 2 years ago
- An automated e-mail OSINT tool☆23Updated 3 years ago
- OSINT mapping using Twitter, Ficklr, Shodan and Insecam☆22Updated 2 years ago
- Enumeration & fingerprint tool☆25Updated last year
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resources☆23Updated 4 years ago
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Social Engin…☆19Updated 3 years ago
- A tool designed to analyse email headers☆35Updated 2 years ago
- ☆24Updated 5 months ago
- An Interface for AI built for cybersecurity professionals☆92Updated 5 months ago
- A repository with informtion related to Cloud Osint☆106Updated 3 months ago
- Internal Network Penetration Test Playbook☆21Updated 4 years ago
- OSINT tool to extract email addresses and other useful info from various GitHub sources.☆46Updated 3 months ago
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆98Updated 8 months ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Retrieve all mails of users related to a git repository, a git user or a git organization☆52Updated last year
- Red Team tools, infrastructure, and hardware weaponized☆106Updated last month
- Collection of scripts and other content to make the life of bots and script-kiddies as hard as possible☆46Updated 2 years ago
- Import, visualize, and analyze SpiderFoot scans in Neo4j, a graph database☆76Updated 2 years ago
- HackersPlayground—a curated collection of cybersecurity resources, tools, and methodologies for penetration testers.☆24Updated 3 months ago
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.☆104Updated last year