SecureCodeWarrior / ai-security-rulesLinks
This repository contains security rule files designed to be used with AI-assisted developer tools.
☆49Updated 2 months ago
Alternatives and similar repositories for ai-security-rules
Users that are interested in ai-security-rules are comparing it to the libraries listed below
Sorting:
- AI 驱动的 SOC 仿真平台☆119Updated last month
- MCP for Security: A collection of Model Context Protocol servers for popular security tools like SQLMap, FFUF, NMAP, Masscan and more. In…☆17Updated 5 months ago
- Deobfuscate Log4Shell payloads with ease.☆170Updated 3 years ago
- Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds☆140Updated this week
- ☆44Updated 6 months ago
- A penetration testing and vulnerability management application written using the powerful django framework.☆30Updated 2 years ago
- BurpSuite MCP Server: A powerful Model Context Protocol (MCP) server implementation for BurpSuite, providing programmatic access to Burp…☆70Updated 9 months ago
- Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation.☆60Updated 2 years ago
- Repository of CVE found by OCD people☆83Updated 7 months ago
- With the help of this automated script, you will never lose track of recently released CVEs.☆53Updated 3 years ago
- Vulnerable Client-Server Application (VuCSA) is made for learning how to perform penetration tests of non-http thick clients. It is writt…☆99Updated 2 years ago
- A CALDERA plugin☆71Updated last month
- SSE to Stdio MCP Proxy Server☆17Updated 7 months ago
- Cloud Penetration Testing Toolkit☆106Updated 3 weeks ago
- Container Excape PoC for CVE-2022-0847 "DirtyPipe"☆78Updated 3 years ago
- A Model Context Protocol (MCP) server for querying the VirusTotal API.☆104Updated 11 months ago
- XtremeNmapParser (XNP) is a tool that takes XML files generated by Nmap and converts them into accessible and easily manipulable formats …☆21Updated 9 months ago
- We publish our challenge questions for everyone.☆94Updated 4 years ago
- An implementation of a Model Context Protocol (MCP) for the Nuclei scanner. This tool enables context-aware vulnerability scanning by int…☆37Updated 6 months ago
- Critical Vulnerabilities in Trend Micro Deep Security Agent for Linux☆26Updated 4 years ago
- Simple tool to decrypt Jenkins encrypted strings☆79Updated 2 years ago
- A multi-agent SOC/DFIR assistant powered by LangChain, LangGraph, and OpenAI models. Automates IOC extraction, MITRE ATT&CK mapping, CVE …☆62Updated 3 weeks ago
- Windows Oracle Database Attack Toolkit☆80Updated 3 years ago
- Based on Lightspin proprietary data, research, and our tracking of cloud security trends in the market, our research team has compiled a …☆40Updated 3 years ago
- Damn Vulnerable SCA Application☆43Updated last week
- ☆80Updated 2 years ago
- CVE-2025-1974☆90Updated 10 months ago
- Volatility Explorer Suit☆66Updated 3 years ago
- Web shell generator and command line interface.☆85Updated 5 years ago
- ☆38Updated 4 years ago