☆27Feb 9, 2026Updated 3 weeks ago
Alternatives and similar repositories for AI-Vuln-Scanner
Users that are interested in AI-Vuln-Scanner are comparing it to the libraries listed below
Sorting:
- Scanning Result of MetaScan's AI GPTScan Engine for 13 DefiHacks Projects under 10 Logic Vuln Types☆13Aug 8, 2023Updated 2 years ago
- AISA-Scanner is an AI-powered autonomous vulnerability scanner that maps CVEs to metasploit exploits, MITRE, CEH, and SANS, delivering in…☆32Jul 31, 2025Updated 7 months ago
- An AI-powered web application vulnerability scanner that automates the detection of common security flaws and provides AI-driven insights…☆29Sep 15, 2024Updated last year
- Converts a hostname (or URI) to IP address using your local resolver☆26Mar 31, 2024Updated last year
- Bybit API client library for Go (ByBit API connector)☆10Dec 19, 2025Updated 2 months ago
- FortiOS 管理界面中的堆内存下溢导致远程代码执行☆23Jun 21, 2023Updated 2 years ago
- Layer 7 DDoS Panel with Cloudflare Bypass ( UAM, CAPTCHA, BFM, etc.. )☆24May 10, 2023Updated 2 years ago
- VulnMapAI combines the power of nmap’s detailed network scanning and the advanced natural language processing capabilities of GPT-4 to ge…☆33Oct 18, 2023Updated 2 years ago
- Chrome extension which sets cookies in bulk from raw header text☆13Mar 2, 2023Updated 3 years ago
- pwndb is a tool that looks for leaked passwords from a dark web breach database given a user or domain.☆37Jul 8, 2020Updated 5 years ago
- Shift from passive documentation to active enforcement.☆25Updated this week
- Android Remote Administration Tool☆41Apr 22, 2021Updated 4 years ago
- Final year project in Magshimim, focusing on Python development and Web Exploitation.☆10Apr 29, 2023Updated 2 years ago
- Pentesting, Red Teaming. Reports☆11May 25, 2023Updated 2 years ago
- ☆32Feb 14, 2026Updated 2 weeks ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- A proof of concept for Joomla's CVE-2015-8562 vulnerability (Object Injection RCE)☆10May 3, 2024Updated last year
- face landmark detection for Android devices with c++, dlib, java, OpenCV☆10Jan 25, 2022Updated 4 years ago
- AI-driven CVE search - deepest analysis of Common Vulnerabilities and Exposures (CVE)☆13Feb 22, 2024Updated 2 years ago
- This is for kex repair and solve VNC server error in kali linux android in Termux .☆17Sep 25, 2023Updated 2 years ago
- Image processing and extracting text from the image (fpga lesson project) Here Verilog code receives the image from the input and recogni…☆11Jul 4, 2023Updated 2 years ago
- Jenkins WebInspect Plugin Publisher provides the ability to upload a WebInspect scan file, from your Jenkins server to your Fortify Softw…☆11Dec 23, 2025Updated 2 months ago
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆47Jan 31, 2025Updated last year
- Webapp builder: The easy (and fast) way to create a web project☆13Jul 3, 2017Updated 8 years ago
- Quake Command-Line Application With Golang☆10Jul 20, 2023Updated 2 years ago
- ☆18Aug 15, 2025Updated 6 months ago
- ☆13Nov 30, 2023Updated 2 years ago
- Dynamic parameter-argument validation for PHP with rich type constraints, attributes, and schema introspection.☆10Feb 22, 2026Updated last week
- 域信息收集工具☆11Jun 5, 2023Updated 2 years ago
- Another pentest of a vulnerable windows server☆15Sep 17, 2021Updated 4 years ago
- a script for Kali Linux☆10Jun 28, 2013Updated 12 years ago
- python exploit for werkzeug debug shell command execution☆10Jun 26, 2017Updated 8 years ago
- ☆14Mar 5, 2023Updated 3 years ago
- Priv8 Tools Software Mass Dork Auto Exploit.☆13Feb 1, 2023Updated 3 years ago
- A tool for sorting Oracle SQL statements in deterministic order☆12Nov 1, 2025Updated 4 months ago
- 基于 ajaxfileupload.js 文件的增强版 ajaxfileupload.js☆11Apr 8, 2019Updated 6 years ago
- I am a simple shell script that downloads all repositories from a user and then hunts them for sh1t.☆11Jul 21, 2022Updated 3 years ago
- Counter-Strike 1.6 Dedicated Server☆10Dec 31, 2022Updated 3 years ago
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆10Jan 5, 2022Updated 4 years ago