gyoisamurai / GyoiThonLinks
GyoiThon is a growing penetration test tool using Machine Learning.
☆775Updated 2 years ago
Alternatives and similar repositories for GyoiThon
Users that are interested in GyoiThon are comparing it to the libraries listed below
Sorting:
- Source code about machine learning and security.☆2,048Updated 2 years ago
- OWASP Xenotix XSS Exploit Framework is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework.☆534Updated 5 years ago
- Vulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.☆568Updated 2 years ago
- Vulnerability Labs for security analysis☆1,173Updated 4 years ago
- Red team Arsenal - An intelligent scanner to detect security vulnerabilities in company's layer 7 assets.☆414Updated 2 years ago
- Automation library for Metasploit☆397Updated last month
- A tool to automate penetration tests☆380Updated last year
- Network reconnaissance and vulnerability assessment tools.☆401Updated 3 years ago
- Burp-Automator: A Burp Suite Automation Tool with Slack Integration. It can be used with Jenkins and Selenium to automate Dynamic Applica…☆480Updated 7 years ago
- Watchdog - A Comprehensive Security Scanning and a Vulnerability Management Tool.☆421Updated 7 years ago
- List of awesome penetration testing resources, tools and other shiny things☆343Updated 7 years ago
- Damn Small Vulnerable Web☆835Updated last year
- Red Team Tool Kit☆1,123Updated 2 years ago
- OWASP ZSC - Shellcode/Obfuscate Code Generator https://www.secologist.com/☆658Updated last year
- WAFNinja is a tool which contains two functions to attack Web Application Firewalls.☆818Updated 7 years ago
- WEB SERVICE SECURITY ASSESSMENT TOOL☆392Updated 3 years ago
- From XSS to RCE 2.75 - Black Hat Europe Arsenal 2017 + Extras☆427Updated 5 years ago
- 2018 BlackHat Tools List☆388Updated 2 years ago
- Collection of commands, tips and tricks and references I found useful during preparation for OSCP exam.☆436Updated 3 years ago
- The Correlated CVE Vulnerability And Threat Intelligence Database API☆948Updated 4 years ago
- Vulnerability scanner based on vulners.com search API☆869Updated 3 weeks ago
- Automate creating resilient, disposable, secure and agile infrastructure for Red Teams.☆908Updated 4 years ago
- Auto Scanning to SSL Vulnerability☆634Updated 4 years ago
- Created by Jin Qian via the GitHub Connector☆783Updated 6 months ago
- kadimus is a tool to check and exploit lfi vulnerability.☆547Updated 5 years ago
- A series of python scripts for generating weird character combinations for bypassing web application firewalls (WAF) and XSS blockers☆277Updated 6 years ago
- WackoPicko is a vulnerable web application used to test web application vulnerability scanners.☆333Updated last year
- DejaVU - Open Source Deception Framework☆414Updated 3 weeks ago
- Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of rel…☆420Updated 2 months ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,294Updated 7 months ago