ls1911 / GenAIPot
GenAIPot is the first A.I honeypot that emulates services and using Generative AI to do that in order to be more stealth.
☆10Updated this week
Related projects: ⓘ
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆27Updated 6 months ago
- Automated vulnerability discovery and annotation☆17Updated last month
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆20Updated 3 weeks ago
- Language-agnostic workflow builder. Modular code that goes from dev to prod in a minute with principled design decisions.☆12Updated 6 months ago
- DefectDojo Community Content☆17Updated 5 months ago
- A TikTok - Live Watcher application for tty / cli - for the unlikely situation when you live in tty, but want to watch TikTok Live.☆25Updated last week
- Programmable, automated machine learning - proof of concept☆13Updated 3 months ago
- Webhood is a privately hosted URL scanner used by threat hunters and security analysts for analyzing phishing and malicious sites.☆23Updated this week
- Open YARA scan- and search engine☆15Updated last year
- ☆20Updated 7 months ago
- Distributed network and vulnerability scanner☆41Updated 6 months ago
- A Reverse Engineering Assistant leveraging Retrieval-Augmented Generation (RAG) and the LLaMA-3.1-8B-Instant Large Language Model (LLM). …☆25Updated last month
- A repository for maintaining a list of the top domains based on multiple lists☆19Updated 2 years ago
- A command line tool for extracting machine learning ready data from software binaries powered by Radare2☆51Updated last week
- ☆15Updated this week
- A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.☆27Updated last year
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated 2 years ago
- Automation tool for Windows Deception Host Burn-In☆71Updated 2 months ago
- Security tools report parsers for Faradaysec.com☆48Updated last week
- Chariot Offensive Security Platform☆21Updated this week
- A JupyterLab extension to evaluate the security of your Jupyter environment☆36Updated last year
- 🌹 Thorn is an open-source, data privacy vault to store and manage PII in a fully compliant manner.☆21Updated 7 months ago
- Maturity Model Collaborative project☆13Updated last year
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆12Updated 3 weeks ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆28Updated 4 months ago
- Burp Suite Enterprise Edition Power Tools☆16Updated last month
- ☆40Updated this week
- Content Discovery Development Platform. A tool to create your own CD solution. This is the new official repo for the project, old C++ and…☆32Updated this week
- CLI tool for interacting with GPT, analyze local files, etc.☆14Updated 3 months ago
- 🕵️♀️ Find, locate, and query files for ops and security experts ⚡️⚡️⚡️☆30Updated last year