anshumanbh / securevibesLinks
A security system to protect your vibecoded apps
☆225Updated last week
Alternatives and similar repositories for securevibes
Users that are interested in securevibes are comparing it to the libraries listed below
Sorting:
- ☆194Updated 2 weeks ago
- ☆101Updated last month
- A collection of Turbo Intruder scripts.☆65Updated 10 months ago
- A research project to add some brrrrrr to Burp☆196Updated 10 months ago
- Payloads for AI Red Teaming and beyond☆311Updated 3 months ago
- Hands-on MCP security lab: 10 real incidents reproduced with vulnerable/secure MCP servers, pytest regressions, and Claude/Cursor battle-…☆61Updated 3 weeks ago
- AI for Ethical Hacking - Workshop☆240Updated 3 weeks ago
- A web CTF for training developers in bug hunting and secure coding!☆101Updated 11 months ago
- Prototype of Full Agentic Application Security Testing, FAAST = SAST + DAST + LLM agents☆67Updated 7 months ago
- Verizon Burp Extensions: AI Suite☆141Updated 8 months ago
- A Go-based utility that processes input through multiple AI models concurrently (OpenAI, Claude, and Gemini) and provides a summarized co…☆88Updated 6 months ago
- FrogPost: postMessage Security Testing Tool☆104Updated 3 weeks ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆99Updated 2 months ago
- ☆63Updated 6 months ago
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆71Updated 8 months ago
- This repository hosts several snippets and file related to the BsidesLV 2024 talk about Shadow and Zombie APIs by me☆18Updated last year
- Secure Code Review AI Agent (SeCoRA) - AI SAST☆54Updated 10 months ago
- The Arcanum Prompt Injection Taxonomy☆375Updated last week
- gRPC Goat is a "Vulnerable by Design" lab created to provide an interactive, hands-on playground for learning and practicing gRPC securit…☆50Updated 3 months ago
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.☆157Updated 3 weeks ago
- ☆350Updated 3 months ago
- AI / LLM Red Team Field Manual & Consultant’s Handbook☆210Updated 2 weeks ago
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆260Updated 3 months ago
- ☆123Updated this week
- AI agent for autonomous cyber operations☆447Updated 3 weeks ago
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆34Updated 9 months ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆107Updated 6 months ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆112Updated last year
- ☆82Updated 3 months ago
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆110Updated last year