A collection of AI-powered tools for phishing detection, adversarial machine learning, and cybersecurity research. Includes Streamlit/Flask apps, attack simulations, LoRA fine-tuning, and secure model evaluation for red teaming and defense.
☆110Sep 21, 2025Updated 5 months ago
Alternatives and similar repositories for WhiteHat
Users that are interested in WhiteHat are comparing it to the libraries listed below
Sorting:
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- An automated hacking tool powered by a trainable AI engine.☆11Jan 12, 2016Updated 10 years ago
- Python tool for large scale git analysis. Inspired by gitrob.☆21Jun 12, 2020Updated 5 years ago
- ☆12Apr 8, 2021Updated 4 years ago
- CLI tool for the Horizon3.ai API☆23Feb 2, 2026Updated last month
- Bibi-Bird is a SQL Injection Automation tool.☆37Feb 20, 2026Updated 2 weeks ago
- Collection of danish base wordlists for cracking danish passwords (Hashcat, John the Ripper etc.)☆29Jan 11, 2023Updated 3 years ago
- A powerful subdomain enumeration tool that aggregates data from multiple sources to create comprehensive lists of root subdomains.☆46Dec 19, 2025Updated 2 months ago
- OSINT tool for domain discovery☆10Apr 5, 2024Updated last year
- Qui puoi trovare i comandi aggiornati per l'uso con Debian 11. Se hai acquistato il libro prima del 2022 probabilmente sei nel posto gius…☆14Jan 11, 2023Updated 3 years ago
- ☆10Feb 27, 2026Updated last week
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆25Apr 19, 2023Updated 2 years ago
- Analyze Emails☆11Dec 8, 2022Updated 3 years ago
- This is check50, a command-line program with which you can check the correctness of your programs.☆12Nov 13, 2021Updated 4 years ago
- Python Exploitation Framework☆30Updated this week
- Switch between two running operating systems without losing their state.☆53Jan 2, 2026Updated 2 months ago
- Open library of musculoskeletal models and examples ready to be used with the AnyBody Modelling System.☆30Updated this week
- This is a short guide how to upload precompiled bin files to ESP8266/ESP32☆90Aug 8, 2022Updated 3 years ago
- Leaky is a powerful toolkit designed to import, manage, search, and visualize massive data leaks including stealer logs, credential dumps…☆47Feb 19, 2026Updated 2 weeks ago
- This is automation tool which utilize 2 sub -domain finder and then sort out working sub-domain and finally scan for sub-doamin TAKEOVER.☆11May 6, 2023Updated 2 years ago
- A lightweight packet-level OMNeT++ simulator designed to simulate large FatTree data center networks.☆11Nov 19, 2013Updated 12 years ago
- Cryptanalysis of a proprietary 1999 video DRM system. Recovers 61 encrypted wrestling videos from the WCW Internet Powerdisk CD-ROM throu…☆25Jan 29, 2026Updated last month
- Predicting breast cancer at 97.51% accuracy with Naive Bayes Classifier for learning purposes.☆13May 1, 2010Updated 15 years ago
- My solutions for pwn and reversing challenges☆10Mar 18, 2018Updated 7 years ago
- In this tutorial we will introduce software defined radios (SDR) and explore the application of machine learning (ML) to radio frequency …☆11Sep 27, 2022Updated 3 years ago
- Open Data and sources for OSINT in Tajikistan☆13Jan 17, 2025Updated last year
- The Eureka Lab Series is designed for learners at all levels of experience and interest in security concepts and technologies.☆10Nov 30, 2025Updated 3 months ago
- Utils for Cryptography class (1047622)☆14Nov 13, 2025Updated 3 months ago
- KikimR the fast PHP micro-framework☆12Nov 22, 2022Updated 3 years ago
- Unlock unlimited Cursor AI trials on any platform. Scripts and helper tools to reset Cursor AI’s config, spin up fresh 150-trial sessions…☆21May 22, 2025Updated 9 months ago
- Fixes corrupted Magic Bytes for PNG, JPG and JPEG☆10Aug 4, 2021Updated 4 years ago
- Nano Pi A64 firmware ( u-boot, kernel 3.10.104 / kernel 3.10.105 )☆10Jun 13, 2019Updated 6 years ago
- Tareas y plazos para los alumnos de 1º DAM del IES Campanillas del curso 2019/2020 en la asignatura de Programación.☆10Jun 1, 2020Updated 5 years ago
- A Repository for Miscellaneous Scripts☆11Jul 18, 2014Updated 11 years ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆10Updated this week
- Python Keylogger PortScanner BruteForce and basic hack tools.(new ones will come soon)☆18Mar 30, 2021Updated 4 years ago
- ☆11Oct 3, 2025Updated 5 months ago
- ⚡ FutureGPT - Application development framework that connects GPT-4 with external data, the internet, other applications and language mod…☆12May 14, 2023Updated 2 years ago
- A script that can be deployed to Azure App for C2 / Proxy / Redirector☆41May 17, 2019Updated 6 years ago