ethanolivertroy / nmap-GPT
This tool helps new security professionals actively learn how to address security concerns associated with open ports on a network device by scanning the device using Nmap and then leveraging the OpenAI API to provide insight on the specific security considerations that should be made for each open port.
☆22Updated last month
Alternatives and similar repositories for nmap-GPT:
Users that are interested in nmap-GPT are comparing it to the libraries listed below
- Uses python3.10, Debian, python-Nmap, OpenaAI, and flask framework to create a Nmap API that can do scans with a good speed online and is…☆79Updated 3 months ago
- Simple Latest CVE Collector Written in Python☆59Updated last year
- ☆43Updated last month
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆41Updated 8 months ago
- An Interface for AI built for cybersecurity professionals☆91Updated 2 months ago
- Interactive, dynamic, and realistic LLM honeypots☆40Updated 2 months ago
- Chat automates Nuclei template generation☆107Updated last year
- Vulnerable Client-Server Application (VuCSA) is made for learning how to perform penetration tests of non-http thick clients. It is writt…☆98Updated last year
- Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation.☆54Updated last year
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆49Updated 10 months ago
- AI Powered Sensitive Information Detection☆18Updated last year
- Origin IP scanning utility developed with ChatGPT☆66Updated last year
- GPT AiCSA(Code security audit),SAST(Static Application Security Testing,静态应用程序安全测试),JAR security analysis, static vulnerability and vulne…☆60Updated last year
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆117Updated 10 months ago
- Trends Website (URL) from Twitter hackers.☆88Updated this week
- Damn Vulnerable SCA Application☆32Updated this week
- Scanner for CVE-2023-22515 - Broken Access Control Vulnerability in Atlassian Confluence☆75Updated last year
- NetworkAssessment: Network Compromise Assessment Tool☆96Updated 10 months ago
- Scanner for CVE-2023-46805 - Ivanti Connect Secure☆10Updated 9 months ago
- Status Checker is a Python tool for swiftly checking the status of URLs. It categorizes responses by HTTP status codes, offering clear in…☆43Updated 9 months ago
- ☆12Updated last year
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆34Updated last year
- A project for fuzzing HTTP/1.1 CL.0 Request Smuggling Attack Vectors☆86Updated last year
- SourceGPT - prompt manager and source code analyzer built on top of ChatGPT as the oracle☆110Updated 2 years ago
- Cloud Exploit Framework☆113Updated 2 years ago
- A simple mutator engine which focuses on finding unknown classes of injection vulnerabilities☆67Updated last year
- With the help of this automated script, you will never lose track of recently released CVEs.☆53Updated 3 years ago
- DLink DIR-846 Authenticated Remote Code Execution☆18Updated last year
- Repository of AI-generated Nuclei templates for public CVEs not yet covered by existing templates, enhancing detection speed and coverage…☆80Updated 4 months ago
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆25Updated last year