haroonawanofficial / AISA-ScannerLinks
AISA-Scanner is an AI-powered autonomous vulnerability scanner that maps CVEs to metasploit exploits, MITRE, CEH, and SANS, delivering intelligent, real-time risk reports.
☆23Updated last month
Alternatives and similar repositories for AISA-Scanner
Users that are interested in AISA-Scanner are comparing it to the libraries listed below
Sorting:
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆17Updated 3 months ago
- AI-Powered Dark Web OSINT Tool☆113Updated 2 weeks ago
- ☆35Updated 5 months ago
- Discovering Typo Squatting on your domains!☆71Updated last year
- Elyzer is an email header analyzer, written in python, capable of detecting potential spoofing attempts.☆45Updated 9 months ago
- Appollo is an open-source tool for continuous attack surface monitoring, helping organizations identify, analyze, and mitigate security r…☆42Updated 5 months ago
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆34Updated last year
- ☆61Updated 3 months ago
- ☆28Updated last year
- DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, login…☆55Updated 2 months ago
- A simple web app to get the latest EPSS data for a CVE ID☆11Updated 5 months ago
- OWASP Amass Docker Compose for setting up a full instance of the infrastructure☆49Updated 2 months ago
- A repository with informtion related to Cloud Osint☆110Updated 5 months ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆52Updated this week
- All-sources tool to search websites by favicons☆172Updated 10 months ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆53Updated this week
- VulnSeer combines the power of Nmap's service detection with multiple AI providers to deliver intelligent vulnerability assessments. Unli…☆41Updated 3 months ago
- Splunk add-on related to the PurpleLab tool☆41Updated last year
- ☆17Updated 5 months ago
- ☆55Updated 8 months ago
- Daily updates from leaked data search engines, aggregators and similar services.☆112Updated this week
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆59Updated 5 months ago
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆128Updated last month
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆45Updated 3 months ago
- Deep Dork Web is a browser-based tool designed to automate Google Dork searches for ethical security research. It supports advanced queri…☆18Updated 6 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆70Updated last year
- ☆55Updated last year
- To be used with tools like GoBuster & DirBuster but these lists are specifically tailored and designed for scanning phishing <>< landing …☆59Updated last week
- A tool for Oragnized ASM (Attack Surface Mapper). Subdomains enumeration, IPs scans, Vulnerability assesment...☆37Updated 2 years ago
- Python-Based Log Analyzer That Detects Brute-Force Attacks, Directory Traversal, And Suspicious Behavior In System Or Web Server Logs. B…☆19Updated 4 months ago