LLM powered agents for scanning vulnerabilities on any website - Llama 3 8B, Groq, Selenium, CrewAI, Exa AI
☆30Aug 8, 2024Updated last year
Alternatives and similar repositories for Katana-AI-Agents-for-website-vulnerabilities-scanning
Users that are interested in Katana-AI-Agents-for-website-vulnerabilities-scanning are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Convert a raw firmware image to an ELF file.☆14Feb 6, 2019Updated 7 years ago
- ☆16Jan 23, 2022Updated 4 years ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆16Jan 9, 2022Updated 4 years ago
- This is a simulation of attack by (Voodoo Bear) APT group targeting entities in Eastern Europe the attack campaign was active as early as…☆11Jun 19, 2024Updated last year
- ☆12Oct 1, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- The Chef symbolic execution platform, based off S2E☆12Nov 1, 2022Updated 3 years ago
- The rev.ng demos☆13Mar 11, 2026Updated last month
- Information gathering tool using OSINT and AI☆17Nov 21, 2024Updated last year
- MQTT Security Testing☆24Jul 26, 2022Updated 3 years ago
- ☆10Jan 3, 2023Updated 3 years ago
- ☆11Dec 4, 2024Updated last year
- From Task-based to Instruction-based Automated Log Analysis☆23Jan 7, 2025Updated last year
- Bybit API client library for Go (ByBit API connector)☆10Dec 19, 2025Updated 4 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A Ligolo-ng JavaScript agent working inside Chrome & Chromium-based browsers by leveraging Isolated Web Applications.☆126Mar 30, 2026Updated last month
- 1ος Πανελλήνιος Μαθητικός Διαγωνισμός Κυβερνοασφάλειας (2023)☆13May 4, 2023Updated 2 years ago
- ☆11Jan 2, 2023Updated 3 years ago
- Dynamic netflow graphs for nfdump☆14Sep 3, 2015Updated 10 years ago
- Binfuzz.js: A Binary Fuzzer in JavaScript☆30Aug 1, 2013Updated 12 years ago
- rolling pwn☆19Feb 27, 2023Updated 3 years ago
- ☆15Aug 5, 2025Updated 8 months ago
- An open source in memory Graph Database for Social Networks☆10Sep 20, 2022Updated 3 years ago
- A collection of cyber tutorials including Python examples☆17Oct 10, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Yet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.☆34Jul 29, 2018Updated 7 years ago
- Monitoring Windows processes tool for malware analysis. Inspired by Regshot tool.☆13Jun 24, 2024Updated last year
- My dotfiles☆10Jul 31, 2024Updated last year
- Obfuscates C/C++ programs by replacing everything with whitespace and #define's☆15Oct 20, 2018Updated 7 years ago
- [EMNLP Findings 2025]. NLP-ADBench is a comprehensive benchmarking tool designed for Anomaly Detection in Natural Language Processing (NL…☆21Oct 9, 2025Updated 6 months ago
- Create HTML profiling reports from pandas DataFrame objects☆12May 19, 2020Updated 5 years ago
- CIDDS: A Configurable and Interactive DAG-based Distributed Ledger Simulation Framework☆15Nov 22, 2022Updated 3 years ago
- Tools that run inside the guest☆11Jan 2, 2020Updated 6 years ago
- Quake Command-Line Application With Golang☆10Jul 20, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43May 7, 2023Updated 2 years ago
- Explain Neural Networks using Layer-Wise Relevance Propagation and evaluate the explanations using Pixel-Flipping and Area Under the Curv…☆17Aug 7, 2022Updated 3 years ago
- Automatic prompt caching for Claude Code. Cuts token costs by up to 90% on repeated file reads, bug fix sessions, and long coding convers…☆103Apr 16, 2026Updated 2 weeks ago
- This repo contains implementation of IP2Vec model which is used for learning similarities between IP Addresses☆13Oct 7, 2025Updated 6 months ago
- pusher server implement in go☆10Sep 10, 2019Updated 6 years ago
- 🌒 Shell command obfuscation to avoid detection systems☆122Oct 10, 2022Updated 3 years ago
- A media sales agent that implements the AdCP Media Buy protocol☆28Apr 24, 2026Updated last week