A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.
☆37Jul 27, 2023Updated 2 years ago
Alternatives and similar repositories for ExploitFlow
Users that are interested in ExploitFlow are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A comprehensive local Linux Privilege-Escalation Benchmark☆45Nov 7, 2025Updated 5 months ago
- ☆19Feb 22, 2022Updated 4 years ago
- This repo contains the codes of the penetration test benchmark for Generative Agents presented in the paper "AutoPenBench: Benchmarking G…☆81Oct 28, 2025Updated 6 months ago
- ☆18Jun 25, 2024Updated last year
- GNN MARL Approach for the CAGE-4 automated cyber defense challenge☆15Nov 18, 2025Updated 5 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- The goal of this repo is to become a benchmark for pentesting☆22Oct 25, 2024Updated last year
- Correlate NVD datasets wIth CWE/CAPEC/CVSS labels for customised usage. Plus static analysis and data visualisation.☆13Nov 17, 2023Updated 2 years ago
- Cybersecurity Intelligent Pentesting Helper for Ethical Researcher (CIPHER). Fine tuned LLM for penetration testing guidance based on wri…☆38Dec 24, 2024Updated last year
- Generate CPG for multiple languages for code and threat analysis☆12Sep 22, 2023Updated 2 years ago
- The original code for SCARA: Scalable Graph Neural Networks with Feature-Oriented Optimization (VLDB 2022) and Scalable Decoupling Graph …☆13Mar 8, 2024Updated 2 years ago
- ☆16Jul 20, 2025Updated 9 months ago
- Helping Ethical Hackers use LLMs in 50 Lines of Code or less..☆1,074Mar 26, 2026Updated last month
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Jun 3, 2021Updated 4 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 6 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Benchmark of LLMs on real open-source projects against dependency hell, legacy toolchains, and complex build systems.☆57Dec 23, 2025Updated 4 months ago
- Implementation and datasets for "Training Language Models to Generate Quality Code with Program Analysis Feedback"☆42Jul 21, 2025Updated 9 months ago
- A Red Team Script to Detect Canary Tokens and Seed Files☆16Jan 2, 2024Updated 2 years ago
- ☆17Jul 1, 2022Updated 3 years ago
- Replication package for ESEC/FSE-2019 submission titled Diversity Web Test Generation☆15Feb 13, 2025Updated last year
- Evolutionary Based Moving Target Cyber-Defense Master Thesis☆12Jan 21, 2020Updated 6 years ago
- CRUSOE: A Toolset for Cyber Situational Awareness and Decision Support in Incident Handling Inspired by the OODA Loop☆15Dec 11, 2024Updated last year
- this will be used for attack graph engine MulVAL to evaluate risk assessment results for different network topologies.☆12Feb 23, 2016Updated 10 years ago
- ☆13Jul 2, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Vulnerabilities, security advisories, exploit codes and proof-of-concept codes.☆10Apr 12, 2026Updated 2 weeks ago
- ☆14Jul 14, 2018Updated 7 years ago
- ☆32Jun 4, 2024Updated last year
- Template for asynchronously controlling meterpreter sessions☆13Jun 19, 2018Updated 7 years ago
- 802.11 radiotap and MPDU parser☆14Nov 23, 2017Updated 8 years ago
- Jess is short for Joern extended by Semantic Slicing. This tool allows you to import C code into a Code Property Graph, and then compute …☆17May 22, 2024Updated last year
- CS-Eval is a comprehensive evaluation suite for fundamental cybersecurity models or large language models' cybersecurity ability.☆62Nov 27, 2024Updated last year
- [IEEE T-IFS] AutoPT: How Far Are We from the Fully Automated Web Penetration Testing?☆35Mar 28, 2026Updated last month
- Osquery Packs we use for customer security hardening☆12Jun 30, 2025Updated 10 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Atlassian Confluence Server 7.5.1 Pre-Authorization Arbitrary File Read vulnerability (CVE-2021-26085)☆14Oct 12, 2021Updated 4 years ago
- Impacket is a collection of Python classes for working with network protocols.☆12Nov 11, 2023Updated 2 years ago
- Deception and Moving Target Defense with Network Attack Simulation Paper Code☆14Dec 13, 2022Updated 3 years ago
- Modified ESP8266 Arduino core for Spacehuhn Projects☆15Aug 7, 2021Updated 4 years ago
- Pdfencrypt is a tool to encrypt/lock PDFs☆10Oct 23, 2021Updated 4 years ago
- Deterministic and monitored traffic generation for inspecting and and training traffic models☆11Nov 19, 2024Updated last year
- ☆12Jun 6, 2023Updated 2 years ago