ethanolivertroy / nmap-GPTLinks
This tool helps new security professionals actively learn how to address security concerns associated with open ports on a network device by scanning the device using Nmap and then leveraging the OpenAI API to provide insight on the specific security considerations that should be made for each open port.
☆23Updated 6 months ago
Alternatives and similar repositories for nmap-GPT
Users that are interested in nmap-GPT are comparing it to the libraries listed below
Sorting:
- An Interface for AI built for cybersecurity professionals☆92Updated 7 months ago
- Chat automates Nuclei template generation☆108Updated last year
- Simple Latest CVE Collector Written in Python☆59Updated last year
- SourceGPT - prompt manager and source code analyzer built on top of ChatGPT as the oracle☆111Updated 2 years ago
- Interactive, dynamic, and realistic LLM honeypots☆60Updated 7 months ago
- Uses python3.10, Debian, python-Nmap, OpenaAI, and flask framework to create a Nmap API that can do scans with a good speed online and is…☆80Updated 8 months ago
- Cloud Exploit Framework☆114Updated 3 years ago
- First iteration of ML based Feedback WAF☆59Updated last year
- 网络安全chatgpt指令集,训练chatgpt成为一名网络安全专家☆63Updated 2 years ago
- Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds☆135Updated this week
- Origin IP scanning utility developed with ChatGPT☆67Updated 2 years ago
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆120Updated last year
- Trends Website (URL) from Twitter hackers.☆104Updated this week
- VulnMapAI combines the power of nmap’s detailed network scanning and the advanced natural language processing capabilities of GPT-4 to ge…☆31Updated last year
- Cake Fuzzer is a project that is meant to help automatically and continuously discover vulnerabilities in web applications created based …☆104Updated 2 months ago
- Vulnerable Client-Server Application (VuCSA) is made for learning how to perform penetration tests of non-http thick clients. It is writt…☆98Updated 2 years ago
- Secrets scanner that understands code☆153Updated 7 months ago
- NetworkAssessment: Network Compromise Assessment Tool☆96Updated last year
- Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation.☆57Updated 2 years ago
- AI Powered Sensitive Information Detection☆19Updated last year
- ☆44Updated 2 months ago
- A simple mutator engine which focuses on finding unknown classes of injection vulnerabilities☆67Updated last year
- An implementation of a Model Context Protocol (MCP) for the Nuclei scanner. This tool enables context-aware vulnerability scanning by int…☆24Updated 2 months ago
- Damn Vulnerable SCA Application☆39Updated 2 months ago
- The IoT security toolkit to help identify IoT related dashboards and scan them for default passwords and vulnerabilities.☆193Updated 10 months ago
- automated tool designed to streamline the search and identification of Proofs of Concept (POCs)☆18Updated last year
- Memory Scaner☆63Updated 3 years ago
- Repository of AI-generated Nuclei templates for public CVEs not yet covered by existing templates, enhancing detection speed and coverage…☆104Updated last week
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆51Updated last year
- ☆112Updated 2 years ago