Shennina - Automating Host Exploitation With AI Shennina - Automating Host Exploitation With AI Reviewed by Zion3R on 8:30 AM Rating: 5
OpenAttack - An Open-Source Package For Textual Adversarial Attack OpenAttack - An Open-Source Package For Textual Adversarial Attack Reviewed by Zion3R on 8:30 AM Rating: 5
WAF-A-MoLE - A Guided Mutation-Based Fuzzer For ML-based Web Application Firewalls WAF-A-MoLE - A Guided Mutation-Based Fuzzer For ML-based Web Application Firewalls Reviewed by Zion3R on 8:30 AM Rating: 5
Advertisement
Eyeballer - Convolutional Neural Network For Analyzing Pentest Screenshots Eyeballer - Convolutional Neural Network For Analyzing Pentest Screenshots Reviewed by Zion3R on 8:30 AM Rating: 5
CyberBattleSim - An Experimentation And Research Platform To Investigate The Interaction Of Automated Agents In An Abstract Simulated Network Environments CyberBattleSim - An Experimentation And Research Platform To Investigate The Interaction Of Automated Agents In An Abstract Simulated Network Environments Reviewed by Zion3R on 8:30 AM Rating: 5
Columbo - A Computer Forensic Analysis Tool Used To Simplify And Identify Specific Patterns In Compromised Datasets Columbo - A Computer Forensic Analysis Tool Used To Simplify And Identify Specific Patterns In Compromised Datasets Reviewed by Zion3R on 5:30 PM Rating: 5
Advertisement
packetStrider - A Network Packet Forensics Tool For SSH packetStrider - A Network Packet Forensics Tool For SSH Reviewed by Zion3R on 8:30 AM Rating: 5
Batea - AI-based, Context-Driven Network Device Ranking Batea - AI-based, Context-Driven Network Device Ranking Reviewed by Zion3R on 5:30 PM Rating: 5
Nethive-Project - Restructured And Collaborated SIEM And CVSS Infrastructure Nethive-Project - Restructured And Collaborated SIEM And CVSS Infrastructure Reviewed by Zion3R on 8:30 AM Rating: 5
Pesidious - Malware Mutation Using Reinforcement Learning And Generative Adversarial Networks Pesidious - Malware Mutation Using Reinforcement Learning And Generative Adversarial Networks Reviewed by Zion3R on 5:30 PM Rating: 5
uriDeep - Unicode Encoding Attacks With Machine Learning uriDeep - Unicode Encoding Attacks With Machine Learning Reviewed by Zion3R on 5:30 PM Rating: 5
Pulsar - Network Footprint Scanner Platform - Discover Domains And Run Your Custom Checks Periodically Pulsar - Network Footprint Scanner Platform - Discover Domains And Run Your Custom Checks Periodically Reviewed by Zion3R on 8:30 AM Rating: 5
Nfstream - A Flexible Network Data Analysis Framework Nfstream - A Flexible Network Data Analysis Framework Reviewed by Zion3R on 8:00 AM Rating: 5
PCFG Cracker - Probabilistic Context Free Grammar (PCFG) Password Guess Generator PCFG Cracker - Probabilistic Context Free Grammar (PCFG) Password Guess Generator Reviewed by Zion3R on 5:30 PM Rating: 5
Mimir - Smart OSINT Collection Of Common IOC Types Mimir - Smart OSINT Collection Of Common IOC Types Reviewed by Zion3R on 8:30 AM Rating: 5
AVCLASS++ - Yet Another Massive Malware Labeling Tool AVCLASS++ - Yet Another Massive Malware Labeling Tool Reviewed by Zion3R on 8:30 AM Rating: 5
ManaTI - A Web-Based Tool To Assist The Work Of The Intuitive Threat Analysts ManaTI - A Web-Based Tool To Assist The Work Of The Intuitive Threat Analysts Reviewed by Zion3R on 9:00 AM Rating: 5
Eyeballer - Convolutional Neural Network For Analyzing Pentest Screenshots Eyeballer - Convolutional Neural Network For Analyzing Pentest Screenshots Reviewed by Zion3R on 6:10 PM Rating: 5
HELK - The Hunting ELK HELK - The Hunting ELK Reviewed by Zion3R on 9:07 AM Rating: 5
EagleEye - Stalk Your Friends. Find Their Instagram, FB And Twitter Profiles Using Image Recognition And Reverse Image Search EagleEye - Stalk Your Friends. Find Their Instagram, FB And Twitter Profiles Using Image Recognition And Reverse Image Search Reviewed by Zion3R on 9:45 AM Rating: 5