aielte-research / HackSynth
LLM Agent and Evaluation Framework for Autonomous Penetration Testing
☆97Updated 4 months ago
Alternatives and similar repositories for HackSynth:
Users that are interested in HackSynth are comparing it to the libraries listed below
- This is The most comprehensive prompt hacking course available, which record our progress on a prompt engineering and prompt hacking cour…☆51Updated last week
- ☆40Updated 2 months ago
- Automated web vulnerability scanning with LLM agents☆305Updated last month
- All-in-one security testing toolbox that brings together popular open source tools through a single MCP interface. Connected to an AI age…☆49Updated this week
- Chat automates Nuclei template generation☆107Updated last year
- AutoSpear☆61Updated last year
- PentestAgent is a novel LLM-driven penetration testing framework to automate intelligence gathering, vulnerability analysis, and exploita…☆32Updated last month
- Interactive, dynamic, and realistic LLM honeypots☆40Updated 2 months ago
- The repository of VulnBot: Autonomous Penetration Testing for A Multi-Agent Collaborative Framework.☆48Updated 2 weeks ago
- ✨ Fully autonomous AI Agents system capable of performing complex penetration testing tasks☆247Updated this week
- A Test Project for a Network Security-oriented LLM Tool Emulating AutoGPT☆285Updated last year
- Cybersecurity Intelligent Pentesting Helper for Ethical Researcher (CIPHER). Fine tuned LLM for penetration testing guidance based on wri…☆21Updated 4 months ago
- All things specific to LLM Red Teaming Generative AI☆24Updated 6 months ago
- Exploit for the vulnerability CVE-2024-43044 in Jenkins☆174Updated 6 months ago
- The D-CIPHER and NYU CTF baseline LLM Agents built for NYU CTF Bench☆65Updated 2 weeks ago
- A simple mutator engine which focuses on finding unknown classes of injection vulnerabilities☆67Updated last year
- ☆48Updated last month
- Come inside, and have a nice cup of tea.☆103Updated last week
- Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation.☆54Updated last year
- Secrets scanner that understands code☆139Updated 2 months ago
- CVE-Bench: A Benchmark for AI Agents’ Ability to Exploit Real-World Web Application Vulnerabilities☆33Updated last week
- PoC. Severity critical.☆70Updated 8 months ago
- Allow exporting the information downloaded with sqlmap to a relational Database like Postgres and sqlite☆43Updated 7 months ago
- YuraScanner☆40Updated 2 months ago
- Repository of AI-generated Nuclei templates for public CVEs not yet covered by existing templates, enhancing detection speed and coverage…☆80Updated 4 months ago
- ☆60Updated this week
- The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromis…☆113Updated last year
- A critical security vulnerability, identified as CVE-2023-50164 (CVE: 9.8) was found in Apache Struts, allowing attackers to manipulate f…☆82Updated 7 months ago
- The IoT security toolkit to help identify IoT related dashboards and scan them for default passwords and vulnerabilities.☆179Updated 4 months ago
- Artifact for ICSE 2023☆49Updated 2 years ago