Pentest AI utilizes machine learning to fully automate penetration testing and exploitation for assessing port, web, and application security. It creates maps of identified CVEs, maps them into Metasploit payloads, and automatically deploys them. The system learns from responses to enable highly precised successful attacks, provides detailed rep…
☆79May 28, 2025Updated 9 months ago
Alternatives and similar repositories for PentestAI-ML
Users that are interested in PentestAI-ML are comparing it to the libraries listed below
Sorting:
- AI-based Web Application Penetration Testing Tool☆24Jan 19, 2024Updated 2 years ago
- AI-Driven Breach and Attack Simulation Tool (Initial Proof of Concept for AI Pentest Copilot)☆26Jan 6, 2025Updated last year
- Automate Pentest Tool☆35Sep 13, 2017Updated 8 years ago
- XSSInspector can defeat any WAF in the world with its AI and 96 filter set. This open-source solution simplifies XSS vulnerability identi…☆12Sep 8, 2025Updated 6 months ago
- deface-X is an automatic deface tool used to inject a website☆13Oct 16, 2025Updated 5 months ago
- World's first Artificial Intelligence (XSS) Cross Site Scripting powered by Machine Learning with extreme fine-tuning designed to detect …☆33Jul 27, 2024Updated last year
- A proving grounds for young and aspiring BBOT modules☆15Aug 31, 2022Updated 3 years ago
- An another JWT cracker but really fast!☆12Jan 26, 2023Updated 3 years ago
- ☆21Jan 30, 2019Updated 7 years ago
- AI-powered penetration testing assistant for automating recon, note-taking, and vulnerability analysis.☆899Mar 2, 2026Updated 2 weeks ago
- VulnMapAI combines the power of nmap’s detailed network scanning and the advanced natural language processing capabilities of GPT-4 to ge…☆32Oct 18, 2023Updated 2 years ago
- convert secret patterns to gf compatible.☆38Feb 11, 2023Updated 3 years ago
- This is a collection of ZAProxy Automation Tools and scripts to automate security tests of WEB Applications and WEB Sites☆26May 14, 2023Updated 2 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Mar 1, 2019Updated 7 years ago
- ☆13Jan 28, 2024Updated 2 years ago
- A list of ChatGPT Prompts for Web Application Security, Bug Bounty, and Pentesting☆38May 18, 2023Updated 2 years ago
- A lightweight Python tool to analyze PCAP files and generate network traffic reports. It detects traffic patterns, security concerns, and…☆18Sep 25, 2024Updated last year
- Browser-based iOS IPA security analyzer.☆56Jan 12, 2026Updated 2 months ago
- Find subdomains by searching public certificate records☆16Jun 11, 2024Updated last year
- Rules-based file management for macOS☆14Jan 11, 2026Updated 2 months ago
- Evergrowing compilation of challenges I authored for various CTF's and my Intended solutions☆13Oct 7, 2022Updated 3 years ago
- A web application attack surface mapping tool. It takes in a list of urls then performs numerous probes☆15Aug 4, 2022Updated 3 years ago
- Google Dork Finder is a Python tool designed to facilitate the use of Google Dorking for searching specific information on the web.☆27Nov 27, 2024Updated last year
- Attempt zone transfers on domains☆18Jul 12, 2021Updated 4 years ago
- Network monitoring and troubleshooting tool for Windows.☆15Jan 2, 2026Updated 2 months ago
- exploitation of php use-after-free vulnerabilities on 64 bit systems | poc||gtfo☆12Apr 8, 2015Updated 10 years ago
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Oct 21, 2023Updated 2 years ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆30Feb 13, 2026Updated last month
- Automatic XSS Vulnerability Scanner, Dorker, and Payload Injector☆25Oct 3, 2024Updated last year
- A fully functional (and unblockable!!) web-based operating system with a desktop environment including THREE differently working proxy br…☆68Feb 26, 2026Updated 3 weeks ago
- Find alive host from dumped subdomains, huge domain list , alive subdomains☆26Mar 29, 2021Updated 4 years ago
- A python based tool for finding SQL vulnerable sites.☆14May 22, 2023Updated 2 years ago
- A collection of scripts to explore domains and pick up information.☆13Sep 17, 2018Updated 7 years ago
- Cybersecurity and Hacking tools made by Python☆13Jan 15, 2022Updated 4 years ago
- ☆61Sep 28, 2022Updated 3 years ago
- SSH brute-force script created for HackTheBox☆16Mar 26, 2020Updated 5 years ago
- shamelessly ripped from https://github.com/khalilbijjou/WAFNinja/☆19Dec 16, 2016Updated 9 years ago
- Scans an internal network using massscan and nmap☆19Nov 21, 2025Updated 4 months ago
- burpsuite extension to analyze javascript files using semgrep☆12Feb 3, 2025Updated last year