4xyy / AI-Vuln-Scanner
An AI-powered web application vulnerability scanner that automates the detection of common security flaws and provides AI-driven insights for impact assessment and remediation suggestions.
☆17Updated 8 months ago
Alternatives and similar repositories for AI-Vuln-Scanner
Users that are interested in AI-Vuln-Scanner are comparing it to the libraries listed below
Sorting:
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 10 months ago
- A National Vulnerability Database (NVD) API query tool☆18Updated last year
- Beacon Object Files used for Cobalt Strike☆18Updated last year
- ☆14Updated 3 years ago
- ☆17Updated 6 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- ☆11Updated 3 weeks ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Updated 2 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆15Updated 3 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- Configurable, Community driven, HTTP C2 Profile☆17Updated 2 months ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- Nemesis agent for Mythic☆27Updated 8 months ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 3 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆16Updated 2 years ago
- ☆18Updated last year
- ☆11Updated 4 years ago
- Serving files with conditions, serverside keying and more.☆18Updated 2 years ago
- ☆28Updated last year
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆14Updated 7 years ago
- ☆18Updated 4 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆11Updated 4 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆13Updated last year
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆16Updated 4 years ago
- ☆17Updated last week
- Experiments with Google Gemini's Vision capabilities for LLM driven/aided web navigation and desktop manipulation☆24Updated 3 months ago
- Test Azure environment for MFA misconfigurations☆11Updated 2 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆23Updated last year