0xSojalSec / strixLinks
β¨ Open-source AI hackers for your apps π¨π»βπ»
β33Updated last month
Alternatives and similar repositories for strix
Users that are interested in strix are comparing it to the libraries listed below
Sorting:
- AI/LLM local model integration for analysis of reconftw resultsβ84Updated 5 months ago
- Here are some cool and some unpublished Dorksβ79Updated 8 months ago
- VulnSeer combines the power of Nmap's service detection with multiple AI providers to deliver intelligent vulnerability assessments. Unliβ¦β40Updated 4 months ago
- dnsprober is a fast and multipurpose DNS reconnaissance tool designed for efficient DNS probing and enumeration. It supports multiple DNSβ¦β33Updated 3 months ago
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!β153Updated 3 weeks ago
- ai-based domain name generationβ95Updated 8 months ago
- A fast Go-based tool to uncover sensitive information in JavaScriptβ34Updated 3 months ago
- A simple browser extension to quickly find interesting security-related information on a webpage.β96Updated last week
- Burp Suite extension for bypassing client-side encryption for pentesting and bug bounty in WebSocketβ84Updated 3 weeks ago
- Discovering Typo Squatting on your domains!β73Updated last year
- β38Updated 3 months ago
- Monitoring the Cloud Landscapeβ88Updated last week
- A blazing-fast, thread-safe, straightforward and zero memory allocations tool to swiftly generate alternative IP(v4) address representatiβ¦β93Updated 2 years ago
- The Template Injection Playground allows to test a large number of the most relevant template engines for template injection possibilitieβ¦β53Updated 2 months ago
- Exposor is a tool using internet search engines to detect exposed technologies with a unified syntax.β57Updated 3 months ago
- This is an AD pentest tools collectionβ59Updated last year
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkitβ248Updated this week
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find entβ¦β127Updated 3 years ago
- IDOR Scanner is a Burp Suite extension that automates the detection and enumeration of potentially vulnerable numeric fields to identify β¦β39Updated 7 months ago
- A collection of Turbo Intruder scripts.β66Updated 8 months ago
- β40Updated last year
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.β60Updated 6 months ago
- Search for sensitive data in Postman public library.β213Updated last month
- The perfect butler for pentesters, bug-bounty hunters and security researchersβ92Updated last year
- Chatio is An AI-powered assistant for hackers and security professionals built for Caidoβ29Updated 2 months ago
- FrogPost: postMessage Security Testing Toolβ97Updated 3 weeks ago
- This repository contains the best fuzzing wordlist filesβ34Updated 10 months ago
- Create your own recon & vulnerability scanner with Trickest and GitHubβ48Updated 2 years ago
- Passive Web Vulnerability Detection Toolβ36Updated 5 months ago
- AIHTTPAnalyzer revolutionizes web application security testing by bringing artificial intelligence capabilities to Burp Suite. This innovβ¦β58Updated 7 months ago