prestonzen / Zenith
Zénith is a multi-lingual cybersecurity AI NLP security verification chatbot in development that references the MITRE ATT&CK Framework, OSCP solution guides, and current cyber ops TTP to assist companies with the ongoing issue of ransomware attacks on their systems. Zenith is designed to source information from open-source intelligence platforms…
☆5Updated 2 years ago
Alternatives and similar repositories for Zenith:
Users that are interested in Zenith are comparing it to the libraries listed below
- ☆17Updated last year
- Developper-proof prevention of SQL injection (java library)☆11Updated 4 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated 2 years ago
- A collection of personal ZAP scripts☆14Updated 2 years ago
- Backscatter and Crosstalk related Side Channel Attacks in modern Optical Networks.☆11Updated last year
- Collection of exploits that were verified by an automated system☆13Updated 3 years ago
- Phishing sites configured to work with Netlify form handling☆12Updated 5 years ago
- Python framework for manipulating bulk WHOIS data from RIRs☆21Updated 3 years ago
- CDitter - Electromechanical based data exfiltration, through the movement of a CD drive☆12Updated 2 years ago
- cool dockerfiles☆12Updated 8 years ago
- Open YARA scan- and search engine☆22Updated 2 months ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16Updated 3 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆21Updated 2 years ago
- Yet another OSINT automator.☆19Updated 4 years ago
- Use a LLM to create the ultimate Leek AI for Leek Wars! 🥬☆13Updated 11 months ago
- A list of backdoor samples I find online.☆13Updated 5 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 5 months ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 5 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- Scan and decode NetWire logs☆11Updated 2 years ago
- Threatfox Censys is a tool to query Censys Search for IP addresses and domains and then parses the JSON and submits the results to Threat…☆32Updated 2 weeks ago
- ☆14Updated 7 years ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆50Updated 3 months ago
- External twitter feeder for AIL framework☆16Updated 2 years ago
- Automated Static Analysis Framework☆9Updated 3 years ago
- Automation platform for open source intelligence☆13Updated 2 years ago
- Upload external IP so you can find your devices elsewhere☆16Updated last year
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆17Updated 4 months ago