lodetomasi / ai-detects-if-cve-was-zero-dayLinks
Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes 50 verified CVEs with 85%+ accuracy using forensic evidence extraction, pattern recognition, and threat intelligence.
☆19Updated 4 months ago
Alternatives and similar repositories for ai-detects-if-cve-was-zero-day
Users that are interested in ai-detects-if-cve-was-zero-day are comparing it to the libraries listed below
Sorting:
- An AI-driven vulnerability scanner that uses Nmap to discover open services on a user-supplied IP, matches each service to relevant CVEs …☆47Updated 7 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆39Updated 9 months ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆37Updated 2 years ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆95Updated 8 months ago
- Laravel RCE Exploitation Toolkit☆48Updated last month
- ☆53Updated 6 months ago
- Manage attack surface data on Elasticsearch☆23Updated 2 years ago
- ☆16Updated 4 months ago
- Top 400 passwords as per HaveIBeenPwned☆22Updated last year
- This is an AD pentest tools collection☆59Updated last year
- MalwareScan is a lightweight and fast malware scanner written in Python. It supports both Windows and Linux platforms and provides an ope…☆13Updated 6 months ago
- The tool helps in quickly identifying vulnerabilities by examining a comprehensive list of potential paths on a website, making it useful…☆11Updated 9 months ago
- A small executable to trick a user to authenticate using code matching MFA☆69Updated 2 years ago
- 🤖 The Modern, Blazing Fast Port Scanner 🤖☆28Updated last year
- Linux post exploitation tool for info gathering and exfiltration 🐧📡💀☆89Updated last month
- Repo for all my exploits/PoCs☆53Updated 7 months ago
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆50Updated 9 months ago
- Nuclei templates for source code analysis. Detects hardcoded secrets, config leaks, debug endpoints. Also helps identify OWASP Top 10 iss…☆82Updated 6 months ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆33Updated last month
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆49Updated 11 months ago
- dnsprober is a fast and multipurpose DNS reconnaissance tool designed for efficient DNS probing and enumeration. It supports multiple DNS…☆33Updated 6 months ago
- Automates the network enumeration process in a fire-and-forget manner, among many more powerful functions. Zero effort, zero error networ…☆62Updated 3 weeks ago
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.☆35Updated last year
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆17Updated last year
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆31Updated last year
- Exposor is a tool using internet search engines to detect exposed technologies with a unified syntax.☆64Updated last month
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆20Updated last year
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆103Updated 8 months ago
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆71Updated 8 months ago