4xyy / AI-Vuln-ScannerLinks
An AI-powered web application vulnerability scanner that automates the detection of common security flaws and provides AI-driven insights for impact assessment and remediation suggestions.
☆24Updated last year
Alternatives and similar repositories for AI-Vuln-Scanner
Users that are interested in AI-Vuln-Scanner are comparing it to the libraries listed below
Sorting:
- A National Vulnerability Database (NVD) API query tool☆17Updated 2 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆17Updated 3 years ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated last year
- python3 scripts to help with aws triage needs☆15Updated 3 years ago
- A steampipe plugin to query projectdiscovery.io tools.☆27Updated last year
- A blazing fast, high performance implementation of AutoRecon in Rust. A multi-threaded network reconnaissance tool which performs automa…☆43Updated 9 months ago
- Go module that returns supported regions for a service or supported services for a region☆16Updated last year
- Use a LLM to create the ultimate Leek AI for Leek Wars! 🥬☆15Updated last year
- self-hosted Azure OSINT tool☆31Updated 3 months ago
- Deployment code for ashirt-server☆20Updated last week
- Kibana app for RedELK☆17Updated 2 years ago
- Experiments with Google Gemini's Vision capabilities for LLM driven/aided web navigation and desktop manipulation☆27Updated 8 months ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 3 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆59Updated 2 years ago
- ☆28Updated 2 years ago
- An ultra lightweight web screenshot tool with advanced DOM analysis features.☆38Updated this week
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- μετάμάσκα - malevolent payload classifier☆24Updated 2 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 4 years ago
- Build a phishing server (Gophish) together with SMTP-redirector (Postfix) automatically in Digital Ocean with terraform and ansible..☆20Updated 4 years ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Updated 10 months ago
- ☆17Updated 8 months ago
- ☆18Updated 2 years ago
- ☆14Updated 4 years ago
- wordlists for password cracking☆28Updated 3 years ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆18Updated 6 months ago
- Pythonize Intruder Payload☆13Updated 4 years ago
- CLI tool written in Go to generate Canary Tokens from https://canarytokens.org☆13Updated last month
- Extract credentials from lsass remotely☆16Updated 5 years ago
- Serving files with conditions, serverside keying and more.☆18Updated 3 years ago