ethiack / ai4ehLinks
AI for Ethical Hacking - Workshop
☆218Updated last month
Alternatives and similar repositories for ai4eh
Users that are interested in ai4eh are comparing it to the libraries listed below
Sorting:
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆226Updated 2 weeks ago
- ☆145Updated 6 months ago
- GarudRecon automates domain recon with top open-source tools to discover assets, enumerate subdomains, and detect XSS, SQLi, LFI, RCE & m…☆133Updated this week
- A New Approach to Directory Bruteforce with WaybackLister v1.0☆207Updated last month
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆358Updated last month
- AI-powered ffuf wrapper☆538Updated 10 months ago
- A Go-based utility that processes input through multiple AI models concurrently (OpenAI, Claude, and Gemini) and provides a summarized co…☆86Updated 3 months ago
- ☆190Updated 5 months ago
- Damn Vulnerable API☆78Updated last week
- A deliberately vulnerable mobile banking application designed for practicing mobile security testing. Features common vulnerabilities fou…☆53Updated last month
- Scripts, files, cheatsheets and more used for pentesting and my OSWE / AWAE exam.☆92Updated last month
- CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).☆138Updated 6 months ago
- Very Vulnerable Management API (VVMA) is a deliberately insecure RESTful API built with Node.js for educational and testing purposes. It …☆63Updated 3 months ago
- A OWASP Based Checklist With 80+ Test Cases☆152Updated 2 years ago
- The repository contains useful GitHub dorks for finding open-source vulnerabilities.☆85Updated last year
- ☆46Updated 6 months ago
- ☆105Updated last year
- SubOwner - A Simple tool check for subdomain takeovers.☆115Updated 11 months ago
- Scripts to download every Wordpress plugin (updated in the last 2 years) and run Semgrep over the lot of it while storing output in a dat…☆80Updated 7 months ago
- A collection of Turbo Intruder scripts.☆65Updated 8 months ago
- Recon MindMap (RMM)☆161Updated last year
- Search for all leaked keys/secrets using one regex! bugbounty☆139Updated 6 months ago
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆176Updated last week
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆54Updated 9 months ago
- This repository contains information on the CVEs I found.☆49Updated last year
- AI/LLM local model integration for analysis of reconftw results☆82Updated 5 months ago
- ☆94Updated 6 months ago
- Scripts and other stuff.☆132Updated last year
- Intelligent web vulnerability analysis suite leveraging Generative AI for developers, pentesters, and security researchers.☆74Updated last month
- ☆74Updated 3 weeks ago