wja0 / IoT-Botnet-Attack-Detection-Module
Development of Botnet Detection Module for Traffic-Based IoT Devices Using Deep Learning
☆13Updated 2 years ago
Alternatives and similar repositories for IoT-Botnet-Attack-Detection-Module:
Users that are interested in IoT-Botnet-Attack-Detection-Module are comparing it to the libraries listed below
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Updated 2 years ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆20Updated 4 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- Another vulnerability scanner☆17Updated last year
- Sources Codes of many Office Malwares☆16Updated 2 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- ParamChanger is a tool allowing you to replace the parameters of a list of urls by a payload entered as an argument☆13Updated 2 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆11Updated 4 years ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆12Updated last year
- Python script that automate the process of generating various reverse shells.☆16Updated 3 years ago
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated last year
- Burp Suite extension for extracting metadata from files☆20Updated 4 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 2 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Updated 3 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- ☆20Updated 4 years ago
- Process injection via KernelCallbackTable☆14Updated 3 years ago
- Manticore's Public Threats Repository☆10Updated 4 years ago
- a ZAPROXY Addon ActiveScan for detecting SQL injection with more better way.☆19Updated last week
- Windows Malware Probe of Concept☆21Updated 2 years ago
- Looto - muilti-thread port scanner with powerful user-friendly GUI. Scan your network to be sure you are safe. This software can use ONLY…☆11Updated 3 years ago
- An exotic service bruteforce tool.☆12Updated 2 years ago
- ☆11Updated 2 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆16Updated 3 years ago
- Linux Malware creator to attack Windows System via Reverse Shell with FindWindow Process Code Injection☆14Updated last year
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Updated 8 years ago
- Ransoblin (Ransomware Bokoblin)☆17Updated 4 years ago