QuantumVillage / HackGPTLinks
Code for the Presentation "Bot-in-the-middle" at Le Hack 2023!
☆17Updated 2 years ago
Alternatives and similar repositories for HackGPT
Users that are interested in HackGPT are comparing it to the libraries listed below
Sorting:
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆78Updated 2 years ago
- Hacking the Singularity. Deep learning hacking. Weaponizing AI in Offensive security☆105Updated last year
- ☆72Updated 5 months ago
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆50Updated last year
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 3 years ago
- A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I h…☆46Updated 2 years ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆54Updated this week
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆121Updated 2 years ago
- InfoSec OpenAI Examples☆19Updated 2 years ago
- Docker container to run Loki : Loki is a python based infrastructure pentesting tool focussing on layer 3 protocols.☆44Updated 3 months ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆29Updated 7 years ago
- WordPress version identification and vulnerability finder.☆31Updated 3 years ago
- Command line tool to get CVE useful info from any web report using the NVD database (NIST). Time saver for analysts.☆41Updated 11 months ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆93Updated 4 months ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆16Updated 6 years ago
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆30Updated last year
- NSE script which leverages the Censys Search API for passive data collection☆58Updated 4 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆25Updated 2 years ago
- All the principles of the AI modular structure that generates malicious code fragments sold on the dark web☆68Updated last year
- an extension for Burp Suite to allow researchers to utilize GPT for analys is of HTTP requests and responses☆112Updated 2 years ago
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆26Updated 2 years ago
- HackersPlayground—a curated collection of cybersecurity resources, tools, and methodologies for penetration testers.☆25Updated 2 months ago
- Industrial Hacking Simulator☆27Updated 3 weeks ago
- Internal Network Penetration Test Playbook☆20Updated 4 years ago
- ☆42Updated 3 years ago
- Create visualization from Shodan query☆75Updated 4 years ago
- ReconPal: Leveraging NLP for Infosec☆57Updated 3 years ago
- A Model Context Protocol server that provides access to Shodan API functionality☆38Updated 7 months ago
- ☆22Updated last year
- GRC (Governance, Risk and Compliance) Software, to manage risks and controls. It is based in best practices and helps organizations to ma…☆27Updated 2 years ago