LLM powered agents for scanning vulnerabilities on any website - Llama 3 8B, Groq, Selenium, CrewAI, Exa AI
☆30Aug 8, 2024Updated last year
Alternatives and similar repositories for Katana-AI-Agents-for-website-vulnerabilities-scanning
Users that are interested in Katana-AI-Agents-for-website-vulnerabilities-scanning are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Convert a raw firmware image to an ELF file.☆14Feb 6, 2019Updated 7 years ago
- Organizational asset discovery tool with 20+ plugins covering certificate transparency, passive DNS, and all 5 Regional Internet Registri…☆54Updated this week
- ☆16Jan 23, 2022Updated 4 years ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆16Jan 9, 2022Updated 4 years ago
- This is a simulation of attack by (Voodoo Bear) APT group targeting entities in Eastern Europe the attack campaign was active as early as…☆11Jun 19, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- ☆13Oct 1, 2020Updated 5 years ago
- Python Exploitation Framework☆38Updated this week
- The Chef symbolic execution platform, based off S2E☆12Nov 1, 2022Updated 3 years ago
- The rev.ng demos☆13Mar 11, 2026Updated last month
- Information gathering tool using OSINT and AI☆17Nov 21, 2024Updated last year
- Vagrant setup for building a machine for CTF/exploit development☆21Apr 21, 2019Updated 6 years ago
- This project uses the Twitter API to pull the tweets in a JSON Format. It then uses Python and Flask to rate those tweets as happy, sad o…☆12Apr 19, 2021Updated 4 years ago
- Some VxWorks fuzzing examples using Cisco-Kitty and WDBDbg framework☆19Mar 13, 2016Updated 10 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆11Jul 25, 2023Updated 2 years ago
- ☆10Jan 3, 2023Updated 3 years ago
- ☆11Dec 4, 2024Updated last year
- Implementing an interactive AI avatar using Python, Blender and GPT☆12Dec 5, 2023Updated 2 years ago
- From Task-based to Instruction-based Automated Log Analysis☆22Jan 7, 2025Updated last year
- Sistem monitoring kualitas air untuk budidaya lele yang menggunakan Internet of Things (IoT) merupakan solusi modern yang memanfaatkan te…☆10Apr 1, 2026Updated last week
- Reproducing feature engineering & oversampling experiments on TPEHG DB and assessing the real impact of over-sampling☆16Jan 19, 2020Updated 6 years ago
- Bybit API client library for Go (ByBit API connector)☆10Dec 19, 2025Updated 3 months ago
- ☆15Jul 18, 2023Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆14Nov 12, 2024Updated last year
- 1ος Πανελλήνιος Μαθητικός Διαγωνισμός Κυβερνοασφάλειας (2023)☆13May 4, 2023Updated 2 years ago
- Website Shop Food Order written PHP & MySQL☆10Nov 14, 2022Updated 3 years ago
- ☆11Jan 2, 2023Updated 3 years ago
- Binfuzz.js: A Binary Fuzzer in JavaScript☆30Aug 1, 2013Updated 12 years ago
- ☆12Jan 12, 2021Updated 5 years ago
- Dynamic netflow graphs for nfdump☆14Sep 3, 2015Updated 10 years ago
- Essential playbooks & runbooks for cybersecurity operations. A dynamic resource for security pros to navigate digital threats, with best …☆17Apr 14, 2025Updated 11 months ago
- GitHub Pages repository for https://guedou.github.io☆11Nov 24, 2025Updated 4 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Tutorial menampilkan data dalam grafik chart.js dengan PHP dan MySQLi☆10Feb 21, 2024Updated 2 years ago
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Nov 27, 2023Updated 2 years ago
- A collection of cyber tutorials including Python examples☆17Oct 10, 2022Updated 3 years ago
- Created using React Native. Inspired from Food Delivery App designed by Andika Wiraputra (https://dribbble.com/shots/15432999-Food-Delive…☆12Jun 9, 2021Updated 4 years ago
- My dotfiles☆10Jul 31, 2024Updated last year
- Obfuscates C/C++ programs by replacing everything with whitespace and #define's☆15Oct 20, 2018Updated 7 years ago
- A simple tool which makes creating nuclei templates even easier.☆37Jun 23, 2024Updated last year