0xSojalSec / strixLinks
β¨ Open-source AI hackers for your apps π¨π»βπ»
β34Updated 5 months ago
Alternatives and similar repositories for strix
Users that are interested in strix are comparing it to the libraries listed below
Sorting:
- AI/LLM local model integration for analysis of reconftw resultsβ91Updated 9 months ago
- A fast Go-based tool to uncover sensitive information in JavaScriptβ37Updated 7 months ago
- An AI-powered assistant for hackers and security professionals built for Caidoβ31Updated 2 weeks ago
- CLI tool that fetches resolved & disclosed HackerOne reports by vulnerability and exports them to CSV.β35Updated 4 months ago
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.β76Updated 10 months ago
- dnsprober is a fast and multipurpose DNS reconnaissance tool designed for efficient DNS probing and enumeration. It supports multiple DNSβ¦β35Updated 7 months ago
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services β¦β103Updated 10 months ago
- A web based checklist driven note taking app following bug bounty and web app pentest methodology.β41Updated 7 months ago
- A Go-based utility that processes input through multiple AI models concurrently (OpenAI, Claude, and Gemini) and provides a summarized coβ¦β89Updated 7 months ago
- This repository contains the best fuzzing wordlist filesβ34Updated last year
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!β154Updated 4 months ago
- gRPC Goat is a "Vulnerable by Design" lab created to provide an interactive, hands-on playground for learning and practicing gRPC securitβ¦β50Updated 4 months ago
- VulnSeer combines the power of Nmap's service detection with multiple AI providers to deliver intelligent vulnerability assessments. Unliβ¦β42Updated 7 months ago
- β33Updated 9 months ago
- ai-based domain name generationβ101Updated last year
- reverse engineered and improved BSQLi script from Coffinxpβ15Updated last year
- β47Updated 11 months ago
- This is an AD pentest tools collectionβ59Updated last year
- SAST and DAST Scan Supported with 400 plus rules available for secrets and allow you add your own wordlist as well. lightweight source cβ¦β108Updated 5 months ago
- β39Updated 7 months ago
- Exposor is a tool using internet search engines to detect exposed technologies with a unified syntax.β65Updated 2 months ago
- TruffleHog Explorer, a user-friendly web-based tool to visualize and analyze data extracted using TruffleHog.β53Updated last month
- Find S3 AWS/GCP/Azure buckets while surfing. S3DNS acts as DNS server, follows CNAMEs and matches any bucket patternβ122Updated 5 months ago
- Discovering Typo Squatting on your domains!β81Updated last year
- IDOR Scanner is a Burp Suite extension that automates the detection and enumeration of potentially vulnerable numeric fields to identify β¦β43Updated 11 months ago
- Here are some cool and some unpublished Dorksβ81Updated last year
- Passive Web Vulnerability Detection Toolβ37Updated 9 months ago
- Scans remote JavaScript files with Trufflehog + Semgrep to detect leaked secretsβ133Updated last year
- vhost scanningβ37Updated 2 years ago
- The perfect butler for pentesters, bug-bounty hunters and security researchersβ93Updated 2 years ago