ErdemOzgen / RedAiRangeLinks
AI Red Teaming Range
☆98Updated 8 months ago
Alternatives and similar repositories for RedAiRange
Users that are interested in RedAiRange are comparing it to the libraries listed below
Sorting:
- Security automation with n8n ideas: 100+ Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.☆196Updated 2 months ago
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features☆145Updated 3 weeks ago
- An archive of 0day.today exploits☆312Updated 3 months ago
- Verizon Burp Extensions: AI Suite☆141Updated 6 months ago
- ☆129Updated 5 months ago
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆67Updated 7 months ago
- Vulnerability scanner for AWS customer managed policies using ChatGPT☆166Updated 2 years ago
- reNgine-ng is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process vi…☆133Updated 3 weeks ago
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆257Updated 2 months ago
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆130Updated 9 months ago
- ☆190Updated 6 months ago
- A multifaceted security tool which leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting and more.☆164Updated 3 months ago
- Scripts to download every Wordpress plugin (updated in the last 2 years) and run Semgrep over the lot of it while storing output in a dat…☆85Updated 9 months ago
- ☆55Updated 9 months ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated last year
- BloodHound-MCP-AI is integration that connects BloodHound with AI through Model Context Protocol, allowing security professionals to anal…☆306Updated 5 months ago
- ☆100Updated last month
- An open-source self-hosted purple team management web application.☆292Updated last month
- Cloud subdomains identification tool☆61Updated 7 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆123Updated 2 years ago
- A visual methodology tracking platform tailored for offensive security assessments☆226Updated last month
- https://lolad-project.github.io/☆82Updated 10 months ago
- SAST and DAST Scan Supported with 400 plus rules available for secrets and allow you add your own wordlist as well. lightweight source c…☆103Updated 2 months ago
- Dredging up secrets from the depths of the file system☆132Updated last year
- ☆195Updated 2 years ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Updated 8 months ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆87Updated 6 months ago
- MailSecOps is an email and mail gateway security testing tool. With this script, you can perform mail spoofing, relay tests and security …☆56Updated last year
- Search for all leaked keys/secrets using one regex! bugbounty☆142Updated 7 months ago
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆268Updated 5 months ago