AashiqRamachandran / i-am-a-botLinks
An Multi-Modal LLM Powered Agent to automatically solve Captchas
☆142Updated last year
Alternatives and similar repositories for i-am-a-bot
Users that are interested in i-am-a-bot are comparing it to the libraries listed below
Sorting:
- Information stealer logs parser☆69Updated 11 months ago
- ☆61Updated 2 months ago
- A project for fuzzing HTTP/1.1 CL.0 Request Smuggling Attack Vectors☆87Updated last year
- Cake Fuzzer is a project that is meant to help automatically and continuously discover vulnerabilities in web applications created based …☆99Updated this week
- Exposor is a tool using internet search engines to detect exposed technologies with a unified syntax.☆57Updated last week
- A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSON☆113Updated last year
- Repository of AI-generated Nuclei templates for public CVEs not yet covered by existing templates, enhancing detection speed and coverage…☆89Updated last month
- A simple mutator engine which focuses on finding unknown classes of injection vulnerabilities☆67Updated last year
- Extracting OSINT Insights from 15TB of GitHub Event Logs☆68Updated last year
- Secrets scanner that understands code☆145Updated 4 months ago
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆39Updated 3 months ago
- Repo for all my exploits/PoCs☆51Updated 2 months ago
- Worlds First Public POC for CVE-2025-1974☆89Updated 3 months ago
- Bounty Prompt is an Open-Source Burp Suite extension by Bounty Security that leverages advanced AI via Burp AI and Groq AI. It enables us…☆96Updated 4 months ago
- APKx is a high-performance tool written in Go for scanning Android APK files to discover sensitive information like URIs, endpoints, and …☆58Updated 3 months ago
- Slip is a CLI tool to create malicious archive files containing path traversal payloads. It supports zip, tar, 7z and zip-like (jar, war,…☆103Updated last month
- ☆37Updated 3 weeks ago
- ☆86Updated 3 months ago
- 🤖 LLM-powered agent for automated Google Dorking in bug hunting & pentesting.☆57Updated last month
- ☆99Updated last year
- Unauthorized Access to Metadata and User Data like CTF☆27Updated 7 months ago
- POC for CVE-2024-34102. A pre-authentication XML entity injection issue in Magento / Adobe Commerce.☆32Updated last year
- ☆85Updated last month
- CVE-2025-24016: RCE in Wazuh server! Remote Code Execution☆53Updated 4 months ago
- External recon toolkit☆50Updated 6 months ago
- SQLMap wrapper that lets you use Interact.sh as a DNS server for exfiltrating data with zero configuration☆41Updated 3 months ago
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆50Updated last year
- 🌐 Modern, lightweight WireGuard VPN web ui panel with a beautiful UI.☆22Updated 4 months ago
- Cloud Exploit Framework☆114Updated 3 years ago
- Improper Authorization Vulnerability in Confluence Data Center and Server☆57Updated last year