4xyy / AI-Vuln-ScannerView external linksLinks
An AI-powered web application vulnerability scanner that automates the detection of common security flaws and provides AI-driven insights for impact assessment and remediation suggestions.
☆28Sep 15, 2024Updated last year
Alternatives and similar repositories for AI-Vuln-Scanner
Users that are interested in AI-Vuln-Scanner are comparing it to the libraries listed below
Sorting:
- Asynchronous named pipe module for PowerShell☆21May 30, 2016Updated 9 years ago
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆21Aug 26, 2020Updated 5 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Aug 23, 2019Updated 6 years ago
- A script made to validate numerous cryptographic-related vulnerabilities such as: Heartbleed, Logjam, CRIME,POODLE, DROWN, Weak Cipher Su…☆19Jul 25, 2016Updated 9 years ago
- Open Source - Common Findings DataBase (JSON & MD)☆67May 9, 2022Updated 3 years ago
- ☆69Dec 19, 2018Updated 7 years ago
- An attempt to detect malware using Opcodes and Hexadecimal Instructions.☆32Sep 6, 2021Updated 4 years ago
- A .Net Core AppDomain isolation alternative.☆31Nov 27, 2019Updated 6 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Mar 6, 2017Updated 8 years ago
- Microsoft Applocker evasion tool☆39Nov 26, 2019Updated 6 years ago
- ☆12Feb 4, 2025Updated last year
- BlueKeep powershell scanner (based on c# code)☆39Nov 11, 2019Updated 6 years ago
- PowerShell scripts☆11Feb 19, 2018Updated 7 years ago
- Socks5 server over Websockets☆40Oct 17, 2018Updated 7 years ago
- Burp extension to specify the token value for the Authenication header while scanning.☆10Sep 18, 2018Updated 7 years ago
- A repo to hold some scripts pertaining WMI (Windows implementation of WBEM) forensics☆88Oct 6, 2017Updated 8 years ago
- Script to output Azure IAM permissions and flag any explicit/owner permissions for review☆10May 18, 2020Updated 5 years ago
- ☆11Dec 30, 2025Updated last month
- Ejemplos y prácticas utilizados en el curso Aprende a programar desde cero con C# de Microsoft .NET☆13Jan 9, 2026Updated last month
- ATL.dll and WmiMgmt.msc UAC Bypass☆12Apr 26, 2025Updated 9 months ago
- Send and receive messages over Named Pipes asynchronously.☆39Sep 17, 2021Updated 4 years ago
- Simple packer for arbitrary data using only .NET API calls. Produces a unique signature with every usage. Standalone program and library.…☆94Apr 27, 2019Updated 6 years ago
- A simple toolkit on extracting RSA Software Tokens from RSA SecureID☆42May 6, 2020Updated 5 years ago
- A C# remoting solution for creating out-of-process AppDomains☆11May 23, 2021Updated 4 years ago
- No Language Left Unlocked: scalable backtranslation of NLLB models☆14Aug 4, 2025Updated 6 months ago
- Datasette plugin for outputting tables in formats suitable for copy and paste☆16Feb 17, 2024Updated last year
- How to really install tensorflow-gpu from source on a clean instance of Ubuntu☆11Sep 29, 2023Updated 2 years ago
- Search bing with python☆12Sep 25, 2014Updated 11 years ago
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆30Sep 24, 2025Updated 4 months ago
- Attack Active Directory Trusts with a single tool☆14Jan 15, 2025Updated last year
- ☆12Mar 17, 2025Updated 10 months ago
- PowerShell script to report the membership of Exchange RBAC role groups☆10Oct 21, 2018Updated 7 years ago
- Simple reverse ICMP shell☆14Apr 30, 2024Updated last year
- Null-free shellcode for running calc.exe on Windows x64☆13Mar 24, 2024Updated last year
- SQL Server DBA Code and Helpful Scripts☆11Aug 16, 2012Updated 13 years ago
- Repo for the testing-genai workshop☆13May 8, 2025Updated 9 months ago
- Example code and files for the MyoWare™ Bionic 3D Printed Claws tutorial☆13May 26, 2015Updated 10 years ago
- ☆10Jun 26, 2024Updated last year
- ☆14Dec 12, 2020Updated 5 years ago