prestonzen / ZenithLinks
Zénith is a multi-lingual cybersecurity AI NLP security verification chatbot in development that references the MITRE ATT&CK Framework, OSCP solution guides, and current cyber ops TTP to assist companies with the ongoing issue of ransomware attacks on their systems. Zenith is designed to source information from open-source intelligence platforms…
☆5Updated 2 years ago
Alternatives and similar repositories for Zenith
Users that are interested in Zenith are comparing it to the libraries listed below
Sorting:
- A collection of personal ZAP scripts☆14Updated 2 years ago
- Collection of exploits that were verified by an automated system☆13Updated 4 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16Updated 4 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆21Updated 3 years ago
- Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.☆19Updated 2 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆29Updated 3 years ago
- A web front-end for password cracking and analytics☆16Updated 6 years ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆50Updated 5 months ago
- Developper-proof prevention of SQL injection (java library)☆11Updated 4 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- Port scanning and domain utility.☆30Updated 7 years ago
- Simple utility to manage multiple ssh☆15Updated 2 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- Documentation of vmc☆16Updated 3 months ago
- Useful scripts I have made for pentests. (nothing pretty)☆9Updated 2 years ago
- cool dockerfiles☆13Updated 9 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Updated 2 years ago
- ☆14Updated 4 years ago
- Open YARA scan- and search engine☆24Updated 4 months ago
- Phishing sites configured to work with Netlify form handling☆12Updated 6 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- Backscatter and Crosstalk related Side Channel Attacks in modern Optical Networks.☆11Updated last year
- A script to automate the creation of cloud infrastructure for hash cracking.☆16Updated 5 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆25Updated 4 years ago
- Ransomware for demonstration☆17Updated 2 years ago
- ☆14Updated 7 years ago
- Use a LLM to create the ultimate Leek AI for Leek Wars! 🥬☆14Updated last year
- Useful commands for infosec☆29Updated 2 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆14Updated 4 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago