NoDataFound / hackGPT
I leverage OpenAI and ChatGPT to do hackerish things
☆858Updated 5 months ago
Alternatives and similar repositories for hackGPT:
Users that are interested in hackGPT are comparing it to the libraries listed below
- Uses ChatGPT API, Bard API, and Llama2, Python-Nmap, DNS Recon, PCAP and JWT recon modules and uses the GPT3 model to create vulnerabilit…☆536Updated 4 months ago
- AI-powered penetration testing assistant for automating recon, note-taking, and vulnerability analysis.☆541Updated 2 weeks ago
- A Burp Suite extension that integrates OpenAI's GPT to perform an additional passive scan for discovering highly bespoke vulnerabilities …☆2,093Updated 9 months ago
- AI-powered cybersecurity chatbot designed to provide helpful and accurate answers to your cybersecurity-related queries and also do code …☆297Updated 4 months ago
- ChatGPT Prompts for Bug Bounty & Pentesting☆599Updated last year
- Awesome EDR Bypass Resources For Ethical Hacking☆1,133Updated 2 months ago
- Black Hat Asia 2023 PDF Public☆575Updated last year
- An open-source intelligence (OSINT) analysis tool leveraging GPT-powered embeddings and vector search engines for efficient data processi…☆409Updated last year
- A curated list of useful resources that cover Offensive AI.☆1,191Updated last month
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆522Updated last year
- OffSec OSINT Pentest/RedTeam Tools☆929Updated 2 months ago
- A Burp Suite extension to add OpenAI (GPT) on Burp and help you with your Bug Bounty recon to discover endpoints, params, URLs, subdomain…☆848Updated last year
- A curated list of awesome security tools, experimental case or other interesting things with LLM or GPT.☆583Updated 2 months ago
- A ChatGPT based penetration testing findings generator.☆131Updated last year
- DetectDee: Hunt down social media accounts by username, email or phone across social networks.☆1,419Updated last year
- Sticky notes for pentesting, bug bounty, CTF.☆676Updated this week
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,058Updated 3 weeks ago
- A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assignments.☆832Updated 4 years ago
- Chiasmodon is an OSINT tool designed to assist in the process of gathering information about a target domain. Its primary functionality …☆559Updated 6 months ago
- Network Security Sniffer☆776Updated this week
- An XSS exploitation command-line interface and payload generator.☆1,352Updated 2 months ago
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.☆733Updated 2 months ago
- The goal of this guide is very simple - to teach anyone interested in cyber security, regardless of their knowledge level, how to make th…☆674Updated 3 months ago
- ☆218Updated 9 months ago
- This is a repository of resource about Malware techniques☆786Updated last year
- A simple tool for bypassing file upload restrictions.☆832Updated 8 months ago
- NucleiFuzzer is a robust automation tool that efficiently detects web application vulnerabilities, including XSS, SQLi, SSRF, and Open Re…☆1,486Updated last week
- Navigate the CVE jungle with ease.☆1,937Updated 2 weeks ago
- Automating Host Exploitation with AI☆533Updated 2 years ago
- GVision is a reverse image search app that use Google Cloud Vision API to detect landmarks and web entities from images, helping you gath…☆248Updated 3 months ago