ethanolivertroy / nmap-GPTLinks
This tool helps new security professionals actively learn how to address security concerns associated with open ports on a network device by scanning the device using Nmap and then leveraging the OpenAI API to provide insight on the specific security considerations that should be made for each open port.
☆22Updated last month
Alternatives and similar repositories for nmap-GPT
Users that are interested in nmap-GPT are comparing it to the libraries listed below
Sorting:
- An Interface for AI built for cybersecurity professionals☆93Updated 11 months ago
- Cloud Exploit Framework☆113Updated 3 years ago
- SourceGPT - prompt manager and source code analyzer built on top of ChatGPT as the oracle☆109Updated 2 years ago
- ☆44Updated 6 months ago
- Chat automates Nuclei template generation☆107Updated 2 years ago
- 网络安全chatgpt指令集,训练chatgpt成为一名网络安全专家☆66Updated 2 years ago
- Simple Latest CVE Collector Written in Python☆59Updated last year
- Trends Website (URL) from Twitter hackers.☆112Updated this week
- Burp Suite Extension with MCP Server to enhance manual application security testing☆33Updated 3 weeks ago
- Uses python3.10, Debian, python-Nmap, OpenaAI, and flask framework to create a Nmap API that can do scans with a good speed online and is…☆80Updated last year
- Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds☆140Updated this week
- AI Powered Sensitive Information Detection☆20Updated last year
- A Model Context Protocol server that provides network asset information based on query conditions. This server allows LLMs to obtain netw…☆63Updated 2 months ago
- An implementation of a Model Context Protocol (MCP) for the Nuclei scanner. This tool enables context-aware vulnerability scanning by int…☆38Updated 6 months ago
- Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation.☆60Updated 2 years ago
- First iteration of ML based Feedback WAF☆59Updated last year
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆52Updated last year
- ☆114Updated 2 years ago
- Vulnerable Client-Server Application (VuCSA) is made for learning how to perform penetration tests of non-http thick clients. It is writt…☆99Updated 2 years ago
- A simple mutator engine which focuses on finding unknown classes of injection vulnerabilities☆67Updated last year
- Secrets scanner that understands code☆165Updated 2 months ago
- Cake Fuzzer is a project that is meant to help automatically and continuously discover vulnerabilities in web applications created based …☆105Updated 6 months ago
- Memory Scaner☆65Updated 3 years ago
- AI 驱动的 SOC 仿真平台☆119Updated last month
- Manage attack surface data on Elasticsearch☆24Updated 2 years ago
- Scanner for CVE-2023-22515 - Broken Access Control Vulnerability in Atlassian Confluence☆78Updated 2 years ago
- TunnelX is a lightweight ingress tunneling tool designed to create a secure SOCKS5 proxy server for routing network traffic.☆65Updated 2 months ago
- The IoT security toolkit to help identify IoT related dashboards and scan them for default passwords and vulnerabilities.☆194Updated last year
- Damn Vulnerable SCA Application☆43Updated 2 weeks ago
- A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.☆37Updated 2 years ago