arthurgervais / maptaView external linksLinks
We present MAPTA, a multi-agent system for autonomous web application security assessment that combines large language model orchestration with tool-grounded execution and end-to-end exploit validation.
☆93Aug 28, 2025Updated 5 months ago
Alternatives and similar repositories for mapta
Users that are interested in mapta are comparing it to the libraries listed below
Sorting:
- Cloak, Honey, Trap: Proactive Defenses Against LLM Agents☆15Jul 9, 2025Updated 7 months ago
- OWASP Web Security Testing Guide RAG system with ChromaDB, MCP for Claude Code☆17Dec 11, 2025Updated 2 months ago
- Books, advice notes, and useful lists, written for people running and working on disinformation deployments☆16Mar 11, 2021Updated 4 years ago
- Protect your PHP project from deserialization attacks! As seen on NDSS 2024☆15Aug 8, 2025Updated 6 months ago
- ☆20Jul 19, 2021Updated 4 years ago
- ☆22Jan 11, 2025Updated last year
- ☆47Jan 20, 2026Updated 3 weeks ago
- Automatically decompile APK's using Docker☆24May 8, 2020Updated 5 years ago
- In-the-wild deepfake detection dataset☆13Mar 5, 2025Updated 11 months ago
- Scripts and things.☆13Jan 23, 2026Updated 3 weeks ago
- Sample SecOps scripts and Utilities☆12Jun 19, 2024Updated last year
- CraftCMS RCE Checker (CVE-2025-32432)☆10Apr 27, 2025Updated 9 months ago
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- INOFFICIAL nfdump with libnfread: library for reading netflow records from nfdump files☆13Jan 28, 2014Updated 12 years ago
- Hack The Box OSCP-like VMs writeups☆11Oct 11, 2020Updated 5 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- Dynamic mode decomposition in Python☆13Jun 9, 2015Updated 10 years ago
- A proof of concept for delivering webbugs via AWS lambda☆46Sep 10, 2018Updated 7 years ago
- 安全本应纯粹,规避内卷,用一杯咖啡回归安全的乐趣!SEC.CAFE 安全咖啡是一个安全爱好者的服务平台与社区。☆49Feb 21, 2025Updated 11 months ago
- A one stop shop for all cyber tooling, frameworks and hacking methodologies☆11Jul 25, 2021Updated 4 years ago
- DOTS - Directed acyclic graph based Online Trajectory Simplification algorithm☆10Aug 7, 2018Updated 7 years ago
- List of links and resources referred to in my SANS OSINT Summit 2024 Talk "OSINT On The Russian Internet"☆11Feb 29, 2024Updated last year
- Simple tool to send the json output from HTTPX to BBRF☆11Mar 30, 2023Updated 2 years ago
- snake-core - the real snake☆15Jul 11, 2023Updated 2 years ago
- ☆10Sep 25, 2024Updated last year
- Fully-featured spear-phishing toolkit - sample docker setup (Linux-compatible)☆13Jan 12, 2025Updated last year
- Test antiviruses☆12Dec 3, 2023Updated 2 years ago
- ☆10Oct 7, 2017Updated 8 years ago
- Parsers for common structures across windows formats.☆12Aug 23, 2023Updated 2 years ago
- Wrapper for TSK (Sleuth Kit) Bindings☆12Jan 10, 2023Updated 3 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago
- A Spring Boot application exposing OWASP ZAP as an MCP (Model Context Protocol) server. It lets any MCP‑compatible AI agent (e.g., Claude…☆34Updated this week
- A set of tools that allow researchers to experiment with certificate chain validation issues☆13Dec 4, 2019Updated 6 years ago
- Point of Concept: To help to automate the collection of evidence for SOC 2 Audits and etc.☆11May 13, 2024Updated last year
- 123123☆16Dec 31, 2025Updated last month
- ☆16Jun 15, 2025Updated 7 months ago
- Some ELF Malwares☆10Mar 11, 2022Updated 3 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year