A-m-anuel / ai-security-scannerView external linksLinks
AI-powered security code analysis and vulnerability scanner built with modern AI models and OWASP best practices.
☆26Jul 6, 2025Updated 7 months ago
Alternatives and similar repositories for ai-security-scanner
Users that are interested in ai-security-scanner are comparing it to the libraries listed below
Sorting:
- Python infrastructure to train paths selectors for symbolic execution engines.☆11Updated this week
- Rapid Web Prototyping with Lightweight Tools: slides from a PyCon tutorial.☆39Jul 13, 2016Updated 9 years ago
- Exercises, Toy problems, scratch pads, and code for blog posts☆10Aug 13, 2025Updated 6 months ago
- open-source first release (OpenCV, Deepface, YOLOv8, Roboflow)☆13Jan 2, 2025Updated last year
- CSI Linux Powerup utility☆13Feb 17, 2025Updated last year
- PLUTO-GPS-SIM generates a GPS baseband signal IQ data stream, which is then transmitted by the software-defined radio (SDR) platform ADA…☆12Dec 27, 2021Updated 4 years ago
- 👈 lightning-fast cd and command execution☆11Sep 27, 2025Updated 4 months ago
- A web-based linux-bash terminal☆10Feb 26, 2020Updated 5 years ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 5 years ago
- ☆11Nov 12, 2019Updated 6 years ago
- Use for Generating Radar Active Jamming Signal Modulation Dataset(11 Types).☆29Updated this week
- ☆21Jun 9, 2012Updated 13 years ago
- Scrypture makes it easy to put Python scripts online. Simply add a class to your Python script and Scrypture will automatically serve you…☆11Oct 23, 2019Updated 6 years ago
- List of bug bounty programs of companies/organisations in Switzerland☆13Oct 28, 2021Updated 4 years ago
- Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups …☆40Updated this week
- 参赛所用的sshop平台☆11Jun 26, 2018Updated 7 years ago
- ysoserial for 1nhann☆11Sep 26, 2022Updated 3 years ago
- A resume builder☆12Aug 1, 2023Updated 2 years ago
- Use deep neural networks to synthesize the Neuroscore for evaluating Generative Adversarial Networks☆10Jun 1, 2020Updated 5 years ago
- simple http(s) proxy with python based sqlmapapi wrapper☆10Jul 20, 2015Updated 10 years ago
- My personal linux server ansible configuration. Provides the ultimate debian experience.☆13Oct 11, 2022Updated 3 years ago
- Convert curl commands to Python code in your browser☆11Apr 6, 2017Updated 8 years ago
- *Unofficial* lgtm.com CLI — Use at your own risk. Also don't add more than 3K projects to "My projects" list.☆13Feb 21, 2022Updated 3 years ago
- A walkthrough of security controls for a serverless architecture via a demo application☆11May 11, 2022Updated 3 years ago
- 甲方企业安全建设开源之路☆10Oct 11, 2018Updated 7 years ago
- Easy to use WiFi tools for the ESP32. Graphical interface provided via IMGUI☆14Mar 2, 2023Updated 2 years ago
- This dataset contains time-series signals of radar active jamming, which are used for research related to radar active jammingrecognition…☆14Mar 15, 2024Updated last year
- ☆11Dec 23, 2025Updated last month
- Unity project for the 3D selection technique RayCursor☆15Feb 25, 2023Updated 2 years ago
- Personal lists containing additional filters to adblock domains.☆14Jan 25, 2021Updated 5 years ago
- awd attack framework,Django + Mysql☆16Feb 8, 2025Updated last year
- 一些Java RASP demo☆11Sep 26, 2019Updated 6 years ago
- ☆18Nov 2, 2025Updated 3 months ago
- My clone repository☆11Feb 1, 2024Updated 2 years ago
- Marine Traffic & Leaflet☆17May 15, 2016Updated 9 years ago
- Core formulae for the Homebrew package manager☆11Jan 21, 2026Updated 3 weeks ago
- ☆11Mar 30, 2017Updated 8 years ago
- A tool to quickly check HTTP-Request-Smuggling, written by python3☆12Jun 17, 2020Updated 5 years ago
- some useful scripts to solve pwn challenges in ctfs☆13Dec 29, 2020Updated 5 years ago