Areej-zeb / AI-Vulnerability-ScannerView external linksLinks
An AI-driven vulnerability scanner that uses Nmap to discover open services on a user-supplied IP, matches each service to relevant CVEs via SBERT embeddings and a severity classifier, and generates tailored remediation steps using a fine-tuned T5 model.
☆47Jun 1, 2025Updated 8 months ago
Alternatives and similar repositories for AI-Vulnerability-Scanner
Users that are interested in AI-Vulnerability-Scanner are comparing it to the libraries listed below
Sorting:
- This repository presents a detailed case study on tracking cryptocurrency transactions and uncovering dark web operations. Using open-sou…☆32Apr 14, 2025Updated 9 months ago
- An advanced scanner for exposed secrets in web pages, APIs, and source code.☆12Apr 22, 2025Updated 9 months ago
- Burpsuite Extension for Jsmon☆22Feb 5, 2026Updated last week
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated 10 months ago
- ☆13Dec 21, 2023Updated 2 years ago
- Some useful books related to Cybersecurity, Linux and more.☆69Dec 31, 2025Updated last month
- Offensive Security & Red Teaming Labs and Projects☆25Aug 26, 2025Updated 5 months ago
- Simulate Windows EXE for Malware Research!☆19Sep 4, 2024Updated last year
- ☆20Jan 14, 2026Updated last month
- ☆55Updated this week
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup dark forums.☆73Jul 29, 2025Updated 6 months ago
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆20Sep 27, 2024Updated last year
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Feb 2, 2024Updated 2 years ago
- Provides an advanced baseline to implement a secure Windows auditing strategy on Windows OS.☆60Jun 9, 2025Updated 8 months ago
- Detect and move orphaned patches from "C:\Windows\Installer" using this PowerShell module☆24Mar 7, 2018Updated 7 years ago
- CVE-2024-30090 - LPE PoC☆108Oct 17, 2024Updated last year
- Abusing SSRF to deliver an authenticated command injection payload☆30Sep 1, 2025Updated 5 months ago
- A list of OSINT resources and tools that may be useful to you when conducting investigations related to the Democratic People's Republic …☆35May 1, 2025Updated 9 months ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Jul 15, 2024Updated last year
- CoupDeWeb is an automated web vulnerability scanner designed for security researchers and developers. It scans for potential vulnerable …☆28Oct 17, 2024Updated last year
- Crack passwords with Hashcat using a Discord Bot.☆28Oct 30, 2023Updated 2 years ago
- A comprehensive modern architecture model is proposed to integrate platform solutions and tooling to support a professional Red Team.☆186Updated this week
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆35Nov 12, 2025Updated 3 months ago
- GPS Tracker ,基于GPS、北斗的定位器,用于车辆、宠物、老人等需要定位追踪的场景☆24May 23, 2025Updated 8 months ago
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆32Sep 15, 2024Updated last year
- Checker de cuentas Blim para android [TERMUX]☆11Jan 21, 2019Updated 7 years ago
- Convert your shellcode into an ASCII string☆127Jun 27, 2025Updated 7 months ago
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆38Apr 7, 2025Updated 10 months ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆84Oct 18, 2024Updated last year
- ☆35Nov 14, 2024Updated last year
- A tool for analyzing vulnerabilities in JWT tokens. Advanced JWT Vulnerability Scanner & Exploitation Toolkit☆45Nov 24, 2025Updated 2 months ago
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆78Aug 25, 2025Updated 5 months ago
- Generate realistic-looking fake meetings to fill up your Microsoft Outlook/Apple/Google calendar. Available in Python and PowerShell.☆32Jan 17, 2024Updated 2 years ago
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆145Jan 12, 2025Updated last year
- ExeRay AI detects malicious Windows executables using ML. Analyzes entropy, imports, and metadata for rapid classification, aiding incide…☆58Aug 8, 2025Updated 6 months ago
- This workshop is designed to provide you with a solid understanding of IronPython, its integration with the .NET framework, and how it ca…☆43Mar 19, 2024Updated last year
- ☆41Sep 9, 2023Updated 2 years ago
- Patches the AmsiScan function in clr.dll allowing for unrestricted assembly loading in .NET☆50May 5, 2025Updated 9 months ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆46Jan 22, 2025Updated last year