ethanolivertroy / nmap-GPTLinks
This tool helps new security professionals actively learn how to address security concerns associated with open ports on a network device by scanning the device using Nmap and then leveraging the OpenAI API to provide insight on the specific security considerations that should be made for each open port.
☆22Updated 3 weeks ago
Alternatives and similar repositories for nmap-GPT
Users that are interested in nmap-GPT are comparing it to the libraries listed below
Sorting:
- An Interface for AI built for cybersecurity professionals☆93Updated 10 months ago
- Simple Latest CVE Collector Written in Python☆59Updated last year
- Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds☆140Updated this week
- Chat automates Nuclei template generation☆108Updated 2 years ago
- Uses python3.10, Debian, python-Nmap, OpenaAI, and flask framework to create a Nmap API that can do scans with a good speed online and is…☆80Updated 11 months ago
- An implementation of a Model Context Protocol (MCP) for the Nuclei scanner. This tool enables context-aware vulnerability scanning by int…☆36Updated 5 months ago
- SourceGPT - prompt manager and source code analyzer built on top of ChatGPT as the oracle☆109Updated 2 years ago
- 网络安全chatgpt指令集,训练chatgpt成为一名网络安全专家☆64Updated 2 years ago
- Vulnerable Client-Server Application (VuCSA) is made for learning how to perform penetration tests of non-http thick clients. It is writt…☆99Updated 2 years ago
- Trends Website (URL) from Twitter hackers.☆109Updated this week
- ☆44Updated 5 months ago
- Cloud Exploit Framework☆114Updated 3 years ago
- The IoT security toolkit to help identify IoT related dashboards and scan them for default passwords and vulnerabilities.☆194Updated last year
- Interactive, dynamic, and realistic LLM honeypots☆71Updated 10 months ago
- First iteration of ML based Feedback WAF☆59Updated last year
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated last year
- Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation.☆59Updated 2 years ago
- AI Powered Sensitive Information Detection☆20Updated last year
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆127Updated last year
- Memory Scaner☆64Updated 3 years ago
- Windows offline filesystem hacking tool for Linux☆96Updated 3 years ago
- Secrets scanner that understands code☆163Updated last month
- automated tool designed to streamline the search and identification of Proofs of Concept (POCs)☆20Updated last year
- 👀CVE Simple List☆74Updated this week
- A Model Context Protocol server that provides network asset information based on query conditions. This server allows LLMs to obtain netw…☆59Updated last month
- Cake Fuzzer is a project that is meant to help automatically and continuously discover vulnerabilities in web applications created based …☆105Updated 5 months ago
- Automatic security vulnerability remediation for your code.☆64Updated this week
- Origin IP scanning utility developed with ChatGPT☆69Updated 2 years ago
- With the help of this automated script, you will never lose track of recently released CVEs.☆53Updated 3 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆35Updated 3 weeks ago