Automated vulnerability discovery and annotation
☆68Jul 26, 2024Updated last year
Alternatives and similar repositories for autokaker
Users that are interested in autokaker are comparing it to the libraries listed below
Sorting:
- Crashbench is a LLM benchmark to measure bug-finding and reporting capabilities of LLMs☆14Jan 20, 2026Updated last month
- AI-powered bug hunter - vscode plugin.☆37Sep 15, 2024Updated last year
- Autonomous AI C2☆33Jul 23, 2024Updated last year
- Web Server Vulnerability Scanning Tool☆36Mar 11, 2025Updated 11 months ago
- BlueSky OSINT Tool☆14Dec 10, 2024Updated last year
- ☆21Sep 10, 2024Updated last year
- Bin2Wrong: a Unified Fuzzing Framework for Uncovering Semantic Errors in Binary-to-C Decompilers☆59May 20, 2025Updated 9 months ago
- A cross-platform plugin for Ghidra that provides deep linking support. This enables the generation of clickable disas:// links that can b…☆42Jan 14, 2026Updated last month
- Backend for Nuclear Pond☆21Dec 7, 2023Updated 2 years ago
- ReARM - Release-Level Supply Chain Evidence Platform. SBOMs, xBOMs and every other artifact - stored for 10+ years, versioned and audit-r…☆92Updated this week
- Zero shot vulnerability discovery using LLMs☆2,506Feb 6, 2025Updated last year
- ☆10May 12, 2022Updated 3 years ago
- An OpenAI-powered triage bot for a slack support channel designed to tag oncalls, prioritize issues, suggest solutions, and streamline co…☆12Jun 11, 2025Updated 8 months ago
- OGhidra bridges Large Language Models (LLMs) via Ollama with the Ghidra reverse engineering platform, enabling AI-driven binary analysis …☆114Feb 20, 2026Updated last week
- Firebase Domain Front Code☆21May 4, 2021Updated 4 years ago
- Data about all known supply-chain attacks through history☆63May 28, 2025Updated 9 months ago
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆42Feb 8, 2026Updated 3 weeks ago
- ☆10Jan 8, 2023Updated 3 years ago
- CTF tasks created☆11Jan 12, 2023Updated 3 years ago
- This tool is designed to seamlessly convert Postman collections into OpenAPI schemas. This conversion is essential for API security testi…☆12Sep 3, 2024Updated last year
- 🛡️Proactive ransomware defense for Windows, providing secure file hiding through camouflage, encrypted mappings, smart shortcuts and sea…☆16Oct 14, 2025Updated 4 months ago
- ☆11Dec 26, 2023Updated 2 years ago
- ☆10Aug 9, 2024Updated last year
- Windows SSPI wrapper in prue python☆15Nov 29, 2023Updated 2 years ago
- Simple reverse ICMP shell☆14Apr 30, 2024Updated last year
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- A sandbox environment designed for loading, running and profiling a wide range of files, including machine learning models, ELFs, Pickle,…☆353Updated this week
- Security tool against dependency typosquatting attacks☆54Feb 25, 2026Updated last week
- Bluetooth Landscape Exploration & Enumeration Platform☆53Dec 31, 2025Updated 2 months ago
- LLAP is an LLVM-based tool for generating enriched program dependency graphs (ePDGs) from program source code that are suitable for use i…☆16May 17, 2023Updated 2 years ago
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 7 months ago
- ☆13Feb 22, 2022Updated 4 years ago
- ☆12Jul 8, 2023Updated 2 years ago
- A walkthrough of security controls for a serverless architecture via a demo application☆11May 11, 2022Updated 3 years ago
- Plugin to visualize Miasm IR graph in Binary Ninja.☆14Aug 7, 2019Updated 6 years ago
- Glass Cage is a zero-click PNG-based RCE chain in iOS 18.2.1, bypassing LockDown mode protection by exploiting ImageIO (CVE-2025-43300), …☆30Jan 11, 2026Updated last month
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Nov 24, 2023Updated 2 years ago
- gradient-based symbolic execution engine implemented from scratch☆37Dec 16, 2023Updated 2 years ago
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆98Feb 25, 2026Updated last week