ethanolivertroy / nmap-GPT
This tool helps new security professionals actively learn how to address security concerns associated with open ports on a network device by scanning the device using Nmap and then leveraging the OpenAI API to provide insight on the specific security considerations that should be made for each open port.
☆22Updated 2 weeks ago
Alternatives and similar repositories for nmap-GPT:
Users that are interested in nmap-GPT are comparing it to the libraries listed below
- An Interface for AI built for cybersecurity professionals☆90Updated last month
- Simple Latest CVE Collector Written in Python☆59Updated last year
- Chat automates Nuclei template generation☆106Updated last year
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆39Updated 7 months ago
- GPT AiCSA(Code security audit),SAST(Static Application Security Testing,静态应用程序安全测试),JAR security analysis, static vulnerability and vulne…☆59Updated last year
- Uses python3.10, Debian, python-Nmap, OpenaAI, and flask framework to create a Nmap API that can do scans with a good speed online and is…☆78Updated 2 months ago
- 网络安全chatgpt指令集,训练chatgpt成为一名网络安全专家☆61Updated last year
- Interactive, dynamic, and realistic LLM honeypots☆37Updated last month
- Scanner for CVE-2023-46805 - Ivanti Connect Secure☆10Updated 8 months ago
- Origin IP scanning utility developed with ChatGPT☆65Updated last year
- First iteration of ML based Feedback WAF☆58Updated last year
- Cloud Exploit Framework☆113Updated 2 years ago
- A project for fuzzing HTTP/1.1 CL.0 Request Smuggling Attack Vectors☆86Updated last year
- ☆43Updated 3 weeks ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆33Updated 3 weeks ago
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆49Updated 10 months ago
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆25Updated last year
- Scanner for CVE-2023-22515 - Broken Access Control Vulnerability in Atlassian Confluence☆75Updated last year
- Lightdash文件读取漏洞(CVE-2023-35844)☆20Updated last year
- Golang tool to help in forcing a license for HAK5 C2 Tool☆46Updated last year
- Repository of AI-generated Nuclei templates for public CVEs not yet covered by existing templates, enhancing detection speed and coverage…☆72Updated 3 months ago
- NetworkAssessment: Network Compromise Assessment Tool☆96Updated 9 months ago
- DLink DIR-846 Authenticated Remote Code Execution☆18Updated last year
- Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation.☆54Updated last year
- Multifunctional open redirection vulnerability scanner.☆31Updated 2 years ago
- OpenSSH Pre-Auth Double Free CVE-2023-25136 POC☆45Updated last year
- These are tools I cheated with the help of ChatGPT to help me with Penetration Testing and Red Teaming☆11Updated last year
- AI Powered Sensitive Information Detection☆18Updated last year
- Trends Website (URL) from Twitter hackers.☆83Updated this week
- CVE-2024-22274: Authenticated Remote Code Execution in VMware vCenter Server☆38Updated 8 months ago