ethiack / ai4ehLinks
AI for Ethical Hacking - Workshop
☆230Updated last week
Alternatives and similar repositories for ai4eh
Users that are interested in ai4eh are comparing it to the libraries listed below
Sorting:
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆260Updated this week
- ☆147Updated 7 months ago
- GarudRecon automates domain recon with top open-source tools to discover assets, enumerate subdomains, and detect XSS, SQLi, LFI, RCE & m…☆164Updated last week
- Damn Vulnerable API☆78Updated last month
- Scripts, files, cheatsheets and more used for pentesting and my OSWE / AWAE exam.☆94Updated 2 months ago
- A deliberately vulnerable mobile banking application designed for practicing mobile security testing. Features common vulnerabilities fou…☆55Updated 2 months ago
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆374Updated last month
- AI-powered ffuf wrapper☆544Updated 10 months ago
- A OWASP Based Checklist With 80+ Test Cases☆153Updated 2 years ago
- A Go-based utility that processes input through multiple AI models concurrently (OpenAI, Claude, and Gemini) and provides a summarized co…☆86Updated 4 months ago
- A New Approach to Directory Bruteforce with WaybackLister v1.0☆210Updated last month
- Recon MindMap (RMM)☆163Updated last year
- Search for all leaked keys/secrets using one regex! bugbounty☆140Updated 6 months ago
- ☆189Updated 6 months ago
- The Template Injection Playground allows to test a large number of the most relevant template engines for template injection possibilitie…☆54Updated 3 months ago
- The Arcanum Prompt Injection Taxonomy☆289Updated 2 months ago
- My personal collection of resources (mostly tools and training materials) for source code security audits.☆92Updated last year
- This repository contains information on the CVEs I found.☆50Updated last year
- CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).☆143Updated 6 months ago
- The repository contains useful GitHub dorks for finding open-source vulnerabilities.☆88Updated last year
- ☆105Updated last year
- ☆94Updated 6 months ago
- AI/LLM local model integration for analysis of reconftw results☆84Updated 5 months ago
- A collection of Turbo Intruder scripts.☆66Updated 8 months ago
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆188Updated last month
- ☆73Updated 4 months ago
- SubOwner - A Simple tool check for subdomain takeovers.☆115Updated last year
- Find CVEs associated to Linux and public exploits on github☆119Updated 6 months ago
- A deliberately vulnerable banking application designed for practicing Security Testing of Web App, APIs, AI integrated App and secure cod…☆430Updated last week
- ☆47Updated 7 months ago