An AI-powered web application vulnerability scanner that automates the detection of common security flaws and provides AI-driven insights for impact assessment and remediation suggestions.
☆29Sep 15, 2024Updated last year
Alternatives and similar repositories for AI-Vuln-Scanner
Users that are interested in AI-Vuln-Scanner are comparing it to the libraries listed below
Sorting:
- Asynchronous named pipe module for PowerShell☆21May 30, 2016Updated 9 years ago
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆21Aug 26, 2020Updated 5 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Aug 23, 2019Updated 6 years ago
- Minimal workflows☆20Mar 19, 2024Updated last year
- A script made to validate numerous cryptographic-related vulnerabilities such as: Heartbleed, Logjam, CRIME,POODLE, DROWN, Weak Cipher Su…☆19Jul 25, 2016Updated 9 years ago
- A steampipe plugin to query projectdiscovery.io tools.☆27Jul 23, 2024Updated last year
- Open Source - Common Findings DataBase (JSON & MD)☆67May 9, 2022Updated 3 years ago
- ☆67Dec 19, 2018Updated 7 years ago
- An attempt to detect malware using Opcodes and Hexadecimal Instructions.☆32Sep 6, 2021Updated 4 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Mar 6, 2017Updated 9 years ago
- ☆12Feb 4, 2025Updated last year
- Security Workshop | Azure☆10Jul 28, 2020Updated 5 years ago
- PowerShell scripts☆11Feb 19, 2018Updated 8 years ago
- BlueKeep powershell scanner (based on c# code)☆39Nov 11, 2019Updated 6 years ago
- Socks5 server over Websockets☆40Oct 17, 2018Updated 7 years ago
- Microsoft Applocker evasion tool☆39Nov 26, 2019Updated 6 years ago
- Script to output Azure IAM permissions and flag any explicit/owner permissions for review☆10May 18, 2020Updated 5 years ago
- Ejemplos y prácticas utilizados en el curso Aprende a programar desde cero con C# de Microsoft .NET☆13Jan 9, 2026Updated 2 months ago
- Secure NotebookLM MCP Server - Query Google NotebookLM from Claude/AI agents with 14 security hardening layers☆37Mar 2, 2026Updated last week
- ATL.dll and WmiMgmt.msc UAC Bypass☆12Apr 26, 2025Updated 10 months ago
- ☆11Dec 30, 2025Updated 2 months ago
- A repo to hold some scripts pertaining WMI (Windows implementation of WBEM) forensics☆88Oct 6, 2017Updated 8 years ago
- Burp extension to specify the token value for the Authenication header while scanning.☆10Sep 18, 2018Updated 7 years ago
- Send and receive messages over Named Pipes asynchronously.☆39Sep 17, 2021Updated 4 years ago
- Simple packer for arbitrary data using only .NET API calls. Produces a unique signature with every usage. Standalone program and library.…☆94Apr 27, 2019Updated 6 years ago
- A simple toolkit on extracting RSA Software Tokens from RSA SecureID☆42May 6, 2020Updated 5 years ago
- A C# remoting solution for creating out-of-process AppDomains☆11May 23, 2021Updated 4 years ago
- Automate pwnage☆12Jul 17, 2018Updated 7 years ago
- Windows SSPI wrapper in prue python☆15Nov 29, 2023Updated 2 years ago
- Execute Shellcode And Other Goodies From MMC☆14Jun 17, 2015Updated 10 years ago
- Repo for the testing-genai workshop☆13May 8, 2025Updated 10 months ago
- PowerShell module to manage domain controllers & initial domain deployments☆13Oct 31, 2025Updated 4 months ago
- ☆12Feb 23, 2015Updated 11 years ago
- Datasette plugin for outputting tables in formats suitable for copy and paste☆16Feb 17, 2024Updated 2 years ago
- TP-Framework: Testability Pattern Framework for SAST☆15May 10, 2024Updated last year
- Injection of MSIL using Cecil☆12Jul 28, 2015Updated 10 years ago
- ☆14Dec 12, 2020Updated 5 years ago
- Logged PS Remote Command Wrapper for Blue Team Forensics/IR☆11Apr 12, 2018Updated 7 years ago
- Offensive toolkit and BloodHound graph creator for DPAPI blobs and master key files☆14Jan 10, 2026Updated last month