An AI-driven vulnerability scanner that uses Nmap to discover open services on a user-supplied IP, matches each service to relevant CVEs via SBERT embeddings and a severity classifier, and generates tailored remediation steps using a fine-tuned T5 model.
☆46Jun 1, 2025Updated 10 months ago
Alternatives and similar repositories for AI-Vulnerability-Scanner
Users that are interested in AI-Vulnerability-Scanner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository presents a detailed case study on tracking cryptocurrency transactions and uncovering dark web operations. Using open-sou…☆33Apr 14, 2025Updated last year
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated last year
- An advanced scanner for exposed secrets in web pages, APIs, and source code.☆13Apr 22, 2025Updated 11 months ago
- Burpsuite Extension for Jsmon☆23Apr 6, 2026Updated last week
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆65Jan 21, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup dark forums.☆77Jul 29, 2025Updated 8 months ago
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated last year
- An OSINT tool for searching DuckDuckGo via Tor using search dorks.☆22May 3, 2025Updated 11 months ago
- ☆59Dec 10, 2025Updated 4 months ago
- MalwareScan is a lightweight and fast malware scanner written in Python. It supports both Windows and Linux platforms and provides an ope…☆13Jun 2, 2025Updated 10 months ago
- 一个基于 Nostr 去中心的匿名远程控制工具 A decentralized anonymous remote control tool based on Nostr☆22Apr 14, 2025Updated last year
- Some useful books related to Cybersecurity, Linux and more.☆83Feb 27, 2026Updated last month
- ☆13Dec 21, 2023Updated 2 years ago
- ☆20Jan 14, 2026Updated 3 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A list of OSINT resources and tools that may be useful to you when conducting investigations related to the Democratic People's Republic …☆36May 1, 2025Updated 11 months ago
- Simulate Windows EXE for Malware Research!☆19Sep 4, 2024Updated last year
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 2 months ago
- Web File Manager☆11Aug 21, 2025Updated 7 months ago
- Cyber-Zero: Training Cybersecurity Agents Without Runtime☆83Feb 13, 2026Updated 2 months ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11Feb 27, 2026Updated last month
- A simple drag and drop tool to document and label fuse boxes☆32May 12, 2023Updated 2 years ago
- Analyse MSI files for vulnerabilities☆142Aug 30, 2024Updated last year
- A Simple JS code to keylogger data and send it to the personal server☆31Dec 30, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Anti-forensics tool Inspired by NSA's Marble framework.☆10Apr 17, 2025Updated 11 months ago
- CVE-2024-30090 - LPE PoC☆107Oct 17, 2024Updated last year
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Feb 2, 2024Updated 2 years ago
- 免杀木马样本☆106Oct 11, 2025Updated 6 months ago
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆147Jan 12, 2025Updated last year
- Visual codebase mapping plugin for OpenCode - auto-generates architecture diagrams as you code☆35Jan 5, 2026Updated 3 months ago
- ☆18Nov 9, 2025Updated 5 months ago
- It’s an OSINT reconnaissance poc powered by Local LLMs (Ollama). You can feed it an email, domain, or IP, and it automatically performs m…☆82Nov 20, 2025Updated 4 months ago
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆49Apr 7, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Abusing SSRF to deliver an authenticated command injection payload☆29Sep 1, 2025Updated 7 months ago
- Selective In-Memory Syscall Unhooking, a stealthy method to bypass user-mode hooks in ntdll.dll☆38Mar 11, 2026Updated last month
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Jul 15, 2024Updated last year
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆40Apr 1, 2025Updated last year
- Repo to hold mcp server for velociraptor☆36Jul 27, 2025Updated 8 months ago
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆79Aug 25, 2025Updated 7 months ago
- See https://github.com/FastCGI-Archives/fcgi2 for a "maintained" mirror☆11May 26, 2016Updated 9 years ago