ethiack / ai4ehLinks
AI for Ethical Hacking - Workshop
☆237Updated this week
Alternatives and similar repositories for ai4eh
Users that are interested in ai4eh are comparing it to the libraries listed below
Sorting:
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆313Updated last month
- ☆157Updated 8 months ago
- GarudRecon automates domain recon with top open-source tools to discover assets, enumerate subdomains, and detect XSS, SQLi, LFI, RCE & m…☆186Updated this week
- A Go-based utility that processes input through multiple AI models concurrently (OpenAI, Claude, and Gemini) and provides a summarized co…☆88Updated 5 months ago
- A OWASP Based Checklist With 80+ Test Cases☆155Updated 3 years ago
- Scripts, files, cheatsheets and more used for pentesting and my OSWE / AWAE exam.☆94Updated 3 months ago
- Damn Vulnerable API☆81Updated 2 months ago
- Recon MindMap (RMM)☆164Updated last year
- SubOwner - A Simple tool check for subdomain takeovers.☆118Updated last year
- ☆191Updated 7 months ago
- The repository contains useful GitHub dorks for finding open-source vulnerabilities.☆89Updated last year
- ☆106Updated last year
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆210Updated 2 months ago
- The Template Injection Playground allows to test a large number of the most relevant template engines for template injection possibilitie…☆54Updated 4 months ago
- Very Vulnerable Management API (VVMA) is a deliberately insecure RESTful API built with Node.js for educational and testing purposes. It …☆65Updated 5 months ago
- Scripts to download every Wordpress plugin (updated in the last 2 years) and run Semgrep over the lot of it while storing output in a dat…☆85Updated 9 months ago
- AI-powered ffuf wrapper☆555Updated last year
- A New Approach to Directory Bruteforce with WaybackLister v1.0☆214Updated 3 months ago
- Bug Bounty Web and API Payloads☆39Updated last year
- A deliberately vulnerable mobile banking application designed for practicing mobile security testing. Features common vulnerabilities fou…☆61Updated last week
- CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).☆146Updated 8 months ago
- AI/LLM local model integration for analysis of reconftw results☆84Updated 7 months ago
- ☆47Updated 8 months ago
- ☆76Updated 6 months ago
- ☆95Updated 8 months ago
- Find CVEs associated to Linux and public exploits on github☆119Updated 7 months ago
- This repository contains my writeups for the labs in PortSwigger's Web Security Academy platform. Each lab writeup includes the lab's nam…☆102Updated 4 months ago
- Scripts and other stuff.☆132Updated 2 years ago
- My personal collection of resources (mostly tools and training materials) for source code security audits.☆94Updated last year
- The Arcanum Prompt Injection Taxonomy☆325Updated 3 months ago