prestonzen / Zenith
Zénith is a multi-lingual cybersecurity AI NLP security verification chatbot in development that references the MITRE ATT&CK Framework, OSCP solution guides, and current cyber ops TTP to assist companies with the ongoing issue of ransomware attacks on their systems. Zenith is designed to source information from open-source intelligence platforms…
☆5Updated 2 years ago
Alternatives and similar repositories for Zenith:
Users that are interested in Zenith are comparing it to the libraries listed below
- A collection of personal ZAP scripts☆14Updated last year
- A repository for maintaining a list of the top domains based on multiple lists☆21Updated 2 years ago
- Backscatter and Crosstalk related Side Channel Attacks in modern Optical Networks.☆11Updated last year
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 3 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆15Updated 3 years ago
- ☆17Updated last year
- Yet another OSINT automator.☆19Updated 4 years ago
- Collection of exploits that were verified by an automated system☆13Updated 3 years ago
- Open YARA scan- and search engine☆19Updated 2 months ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated 2 years ago
- Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.☆19Updated 2 years ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆47Updated last month
- A Passive DNS backend and collector☆31Updated 2 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- List of sources for cybersecurity news☆36Updated 2 years ago
- External twitter feeder for AIL framework☆17Updated last year
- A collection of tools adversaries commonly use in an attack.☆14Updated 2 months ago
- Conduct forensic investigation of suspicious domains, websites and other dangerous thing without the fear of being infected! A Live opera…☆18Updated 2 years ago
- vyos based isolation of networks☆11Updated 4 years ago
- Scan and decode NetWire logs☆11Updated 2 years ago
- Digital Forensics date and time☆23Updated last month
- A web front-end for password cracking and analytics☆14Updated 6 years ago
- ☆22Updated 4 months ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆9Updated 3 years ago
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.☆17Updated last year
- ☆14Updated 3 weeks ago
- Automation platform for open source intelligence☆13Updated last year
- Phishing sites configured to work with Netlify form handling☆12Updated 5 years ago
- A tool for gathering potentially sensitive data from github's public stream☆14Updated 8 years ago
- Developper-proof prevention of SQL injection (java library)☆11Updated 4 years ago