aliasrobotics / caiLinks
Cybersecurity AI (CAI), the framework for AI Security
☆3,336Updated this week
Alternatives and similar repositories for cai
Users that are interested in cai are comparing it to the libraries listed below
Sorting:
- HexStrike AI MCP Agents is an advanced MCP server that lets AI agents (Claude, GPT, Copilot, etc.) autonomously run 150+ cybersecurity to…☆1,689Updated last week
- Zero shot vulnerability discovery using LLMs☆2,254Updated 6 months ago
- AI Red Teaming playground labs to run AI Red Teaming trainings including infrastructure.☆1,520Updated 2 weeks ago
- Autonomous Privilege Escalation using AI☆829Updated 5 months ago
- Conference presentation slides☆2,212Updated last week
- best tool for finding SQLi,CRLF,XSS,LFi,OpenRedirect☆1,294Updated 4 months ago
- Penetration Testing For - Web | Mobile | API | Thick Client | Source Code Review | DevSecOps | Wireless | Network Pentesting, etc...☆969Updated last month
- AI-Powered Penetration Testing Assistant☆1,142Updated this week
- CF-Hero is a reconnaissance tool that uses multiple data sources to discover the origin IP addresses of Cloudflare-protected web applicat…☆1,720Updated 2 months ago
- NucleiFuzzer is a robust automation tool that efficiently detects web application vulnerabilities, including XSS, SQLi, SSRF, and Open Re…☆1,687Updated last week
- A Burp Suite extension that integrates OpenAI's GPT to perform an additional passive scan for discovering highly bespoke vulnerabilities …☆2,202Updated last year
- A curated list of tools officially presented at Black Hat events☆657Updated last month
- An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws☆3,654Updated 6 months ago
- An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for …☆1,238Updated last year
- Header Exploitation HTTP☆632Updated last month
- how to look for Leaked Credentials !☆977Updated last year
- Autoswagger by Intruder - detect API auth weaknesses☆1,246Updated 3 weeks ago
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,159Updated 3 months ago
- MCP for Security: A collection of Model Context Protocol servers for popular security tools like SQLMap, FFUF, NMAP, Masscan and more. In…☆360Updated last week
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,085Updated this week
- Buttercup finds and patches software vulnerabilities☆1,126Updated this week
- A list of Google Dorks for Bug Bounty, Web Application Security, and Pentesting☆1,247Updated 9 months ago
- Bug Bounty Tricks and useful payloads and bypasses for Web Application Security.☆653Updated last week
- This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter☆3,082Updated last year
- Taranis AI is an advanced Open-Source Intelligence (OSINT) tool, leveraging Artificial Intelligence to revolutionize information gatherin…☆786Updated this week
- A list of open source web security scanners☆1,251Updated 4 months ago
- 🚀 Caido releases, wiki and roadmap☆1,698Updated this week
- The Network Execution Tool☆4,619Updated this week
- The recursive internet scanner for hackers. 🧡☆8,917Updated this week
- Active Directory and Internal Pentest Cheatsheets☆1,698Updated 2 weeks ago