haroonawanofficial / AISA-ScannerView external linksLinks
AISA-Scanner is an AI-powered autonomous vulnerability scanner that maps CVEs to metasploit exploits, MITRE, CEH, and SANS, delivering intelligent, real-time risk reports.
☆32Jul 31, 2025Updated 6 months ago
Alternatives and similar repositories for AISA-Scanner
Users that are interested in AISA-Scanner are comparing it to the libraries listed below
Sorting:
- ☆22Nov 22, 2025Updated 2 months ago
- A new era for SOCs begins☆24Jun 4, 2025Updated 8 months ago
- S4A main repository. SaltStack states, install script and build scripts☆27Jan 14, 2026Updated last month
- Design + Code for kelsanford.design☆11Jul 1, 2015Updated 10 years ago
- A framework for interacting with HCL AppScan on Cloud and HCL AppScan Enterprise☆12Mar 3, 2023Updated 2 years ago
- Open-source stealer logs parser and visualization dashboard that structures and presents log data to facilitate analysis.☆67Updated this week
- ☆11Aug 31, 2019Updated 6 years ago
- Python's dependable dependency injection container for managing lifecycles and registrations.☆14May 16, 2024Updated last year
- Extract data from a variety of eGift card emails, and from swiped physical gift cards.☆11Feb 1, 2019Updated 7 years ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆46Jan 22, 2025Updated last year
- A repository for managing the complete lifecycle of large language model (LLM) development. This toolkit integrates open-source framework…☆12Jan 8, 2025Updated last year
- Python script to create CSV, HTML & PDF filtered for repo tags☆13Jul 26, 2024Updated last year
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- ☆11Nov 24, 2025Updated 2 months ago
- A Python based Recon Tool to search for Storage Buckets☆11Jan 21, 2023Updated 3 years ago
- Helps generate better emoji assets for the Telegram's Android client.☆11Jan 2, 2019Updated 7 years ago
- ☆15Jan 19, 2026Updated 3 weeks ago
- This program detects if any security software (AV, EDR, XDR, firewall, etc.) is running on the system. The program searches the list of r…☆50Jan 13, 2026Updated last month
- Ios 11-11.1.2 Jailbreak And ios 10-10.3.3 jailbreak. ORIGINAL PROJECT: https://github.com/JosephShenton/C0F3☆13Feb 8, 2018Updated 8 years ago
- Kibana Plugin to Associate custom CSS to Dashboards☆11May 11, 2021Updated 4 years ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- Automated Real-Time Threat Hunting with ATD, Active Response and Elasticsearch/Kibana☆10Aug 17, 2018Updated 7 years ago
- A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments☆10Sep 22, 2015Updated 10 years ago
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- How to Convert Bitcoin-PUBKEY HEX Public Keys to Base58 Bitcoin Address and Check Balance for BTC Coins☆11Aug 26, 2022Updated 3 years ago
- Go(od) Job is a simple job scheduler that supports task retries, logging, and task sharding.☆12Sep 10, 2024Updated last year
- Decoupled AI copilot for pentesting & CTFs. Sidecar tails your shell history, parses tool outputs, grounds suggestions in your notes, and…☆13Nov 21, 2025Updated 2 months ago
- Pentesting tool to automate common op tasks and organize discovered data.☆13Dec 23, 2025Updated last month
- DUST ATTACK blockchain transaction with confirmation of isomorphism for a total amount of 10000 BTC☆11Feb 4, 2026Updated last week
- Osquery Packs we use for customer security hardening☆12Jun 30, 2025Updated 7 months ago
- ☆11Jan 5, 2022Updated 4 years ago
- Repository to archive AWS Documentation for local use☆50Oct 14, 2024Updated last year
- ETW-Almulahaza is a consumer python-based tool that help you monitor ETW events of the operating system☆13Jun 24, 2022Updated 3 years ago
- ReDriveApp (short for "Recommended" or "Replacement" DriveApp). AppsScript class that provides equivalent methods offered by the built-in…☆18Nov 18, 2025Updated 2 months ago
- Updates the Emerging Threats open ruleset for Suricata☆10Sep 20, 2015Updated 10 years ago
- 🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.☆12Jan 11, 2020Updated 6 years ago
- ☆10Oct 9, 2023Updated 2 years ago
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year
- SQL injector vulnerability scanner and exploiter along with sqli dork scanner☆13Dec 20, 2021Updated 4 years ago