111Cyber0cculte888
i love light in the cyber space Break ice,Break IA, Break Code, No logic, No Skill No Background, Just Assembl the block The project is.. Break The Ice
skymoon
Pinned Repositories
4nonimizer
A bash script for anonymizing the public IP used to browsing Internet, managing the connection to TOR network and to different VPNs providers (OpenVPN)
ADSec-and-RedTeam
record some AD security and Red Team contents
advML
adversarial machine learning for anti-malware software
AI-Driven-WAF
Artificial intelligence-driven Web Firewall
AI-Security-Learning
自身学习的安全数据科学和算法的学习资料
CVE-2021-40446
CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit
machine_learning_security
Source code about machine learning and security.
redteam_toolkit
Collection of tools that aid in red team operations
RootKits-List-Download
This is the list of all rootkits found so far on github and othersites.
Zeratool
Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems
111Cyber0cculte888's Repositories
111Cyber0cculte888/F-Scrack
一款python编写的轻量级弱口令检测脚本,目前支持以下服务:FTP、MYSQL、MSSQL、MONGODB、REDIS、TELNET、ELASTICSEARCH、POSTGRESQL。
111Cyber0cculte888/Worse-PDF
Turn a normal PDF file into malicious.Use to steal Net-NTLM Hashes from windows machines.
111Cyber0cculte888/Botnet
Lightweight Botnet Client-Server
111Cyber0cculte888/my-crypto-works
My cryptography code snippets and works.
111Cyber0cculte888/everydaylearn
i`m a cat ~ find fish
111Cyber0cculte888/machine_learning_security
Source code about machine learning and security.
111Cyber0cculte888/awesome-ml-for-cybersecurity
:octocat: Machine Learning for Cyber Security
111Cyber0cculte888/deep-learning-with-python-notebooks
Jupyter notebooks for the code samples of the book "Deep Learning with Python"
111Cyber0cculte888/lpeworkshop
Windows / Linux Local Privilege Escalation Workshop
111Cyber0cculte888/Machine-Learning-Tutorials
machine learning and deep learning tutorials, articles and other resources
111Cyber0cculte888/RedHunt-OS
Virtual Machine for Adversary Emulation and Threat Hunting
111Cyber0cculte888/x-crack
x-crack - Weak password scanner, Support: FTP/SSH/SNMP/SSQL/MYSQL/PostGreSQL/REDIS/ElasticSearch/MONGODB
111Cyber0cculte888/isf
ISF(Industrial Control System Exploitation Framework),a exploitation framework based on Python
111Cyber0cculte888/EasyML
Easy Machine Learning is a general-purpose dataflow-based system for easing the process of applying machine learning algorithms to real world tasks.
111Cyber0cculte888/portspoof
Portspoof
111Cyber0cculte888/deeplearningbook-chinese
Deep Learning Book Chinese Translation
111Cyber0cculte888/MLCheckWebshell
111Cyber0cculte888/cyberweapons
Automated Cyber Offense
111Cyber0cculte888/PassGAN
A Deep Learning Approach for Password Guessing (https://arxiv.org/abs/1709.00440)
111Cyber0cculte888/Machine-Learning-for-Cyber-Security
Curated list of tools and resources related to the use of machine learning for cyber security
111Cyber0cculte888/Python-Rootkit
Python Remote Administration Tool (RAT) to gain meterpreter session
111Cyber0cculte888/DetectLM
Detecting Lateral Movement with Machine Learning
111Cyber0cculte888/ML
figure everything out
111Cyber0cculte888/DL_for_xss
Deep learnning for detection with xss
111Cyber0cculte888/nmaptable
Transform NMap Scans to an D3.js HTML Table
111Cyber0cculte888/Machine-Learning-Based-Malware-Detection-Engine
ML Malware Detection
111Cyber0cculte888/aktaion
Aktaion: Open Source ML tool and data samples for Exploit and Phishing Research
111Cyber0cculte888/nifi_workflow
Nifi workflow
111Cyber0cculte888/Javascript-Backdoor
Learn from Casey Smith @subTee
111Cyber0cculte888/Microsploit
Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer Overflow