antoninoLorenzo / AI-OPSLinks
Penetration Testing AI Assistant based on open source LLMs.
☆84Updated 2 months ago
Alternatives and similar repositories for AI-OPS
Users that are interested in AI-OPS are comparing it to the libraries listed below
Sorting:
- LLM Powered Pentesting for your software☆131Updated 2 weeks ago
- Prompt Injections Everywhere☆128Updated 10 months ago
- Pentest AI utilizes machine learning to fully automate penetration testing and exploitation for assessing port, web, and application secu…☆65Updated 3 weeks ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆163Updated last year
- NOT for educational purposes: An MCP server for professional penetration testers including STDIO/HTTP/SSE support, nmap, go/dirbuster, ni…☆47Updated 2 weeks ago
- AI-based Web Application Penetration Testing Tool☆24Updated last year
- ☆231Updated last year
- An Interface for AI built for cybersecurity professionals☆91Updated 4 months ago
- ☆63Updated 4 months ago
- A LLM explicitly designed for getting hacked☆152Updated last year
- AI Powered Terminal Based Ethical Hacking Assistant☆68Updated 4 months ago
- AIHTTPAnalyzer revolutionizes web application security testing by bringing artificial intelligence capabilities to Burp Suite. This innov…☆56Updated 3 months ago
- some prompt about cyber security☆217Updated last year
- 🤖 LLM-powered agent for automated Google Dorking in bug hunting & pentesting.☆56Updated last month
- A list of curated resources for people interested in AI Red Teaming, Jailbreaking, and Prompt Injection☆195Updated last month
- Vulnerability scanner for AWS customer managed policies using ChatGPT☆164Updated 2 years ago
- Chrome extension tool for OSINT & Recon☆53Updated last year
- SourceGPT - prompt manager and source code analyzer built on top of ChatGPT as the oracle☆111Updated 2 years ago
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆105Updated last month
- ☆79Updated last month
- Welcome to the Bug Hunter's Wordlists repository! 🐛🔍 This repository serves as a comprehensive collection of essential wordlists utiliz…☆150Updated last year
- Red teaming is an attack technique used in cyber security to test how an organisation would respond to a genuine cyber attack. It is done…☆21Updated 2 months ago
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆40Updated 2 months ago
- A Model Context Protocol (MCP) server for querying the VirusTotal API.☆62Updated 3 months ago
- AI-powered cybersecurity chatbot designed to provide helpful and accurate answers to your cybersecurity-related queries and also do code …☆309Updated 7 months ago
- World's first Artificial Intelligence (XSS) Cross Site Scripting powered by Machine Learning with extreme fine-tuning designed to detect …☆27Updated 10 months ago
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆126Updated last year
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated 10 months ago
- Automated OSINT on SwaggerHub☆172Updated last year
- ☆64Updated 3 weeks ago