prestonzen / Zenith
Zénith is a multi-lingual cybersecurity AI NLP security verification chatbot in development that references the MITRE ATT&CK Framework, OSCP solution guides, and current cyber ops TTP to assist companies with the ongoing issue of ransomware attacks on their systems. Zenith is designed to source information from open-source intelligence platforms…
☆5Updated 2 years ago
Alternatives and similar repositories for Zenith
Users that are interested in Zenith are comparing it to the libraries listed below
Sorting:
- Collection of exploits that were verified by an automated system☆13Updated 3 years ago
- A collection of personal ZAP scripts☆14Updated 2 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆21Updated 3 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16Updated 3 years ago
- ☆17Updated last year
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- Phishing sites configured to work with Netlify form handling☆12Updated 5 years ago
- A script to automate the creation of cloud infrastructure for hash cracking.☆16Updated 5 years ago
- Yet another OSINT automator.☆19Updated 4 years ago
- Open YARA scan- and search engine☆23Updated 2 months ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 5 years ago
- A utility that automatically takes screenshots of coordinates using Google Earth.☆26Updated 4 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- Linkedin Tools (and maybe later other source) to reconstruct a company hierarchy from scraping relations and jobs title☆17Updated 4 years ago
- Collection of videos of Raids on Cybercriminals☆19Updated last month
- Developper-proof prevention of SQL injection (java library)☆11Updated 4 years ago
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.☆17Updated this week
- List of sources for cybersecurity news☆36Updated 2 years ago
- Beautify Nessus scan output☆11Updated last year
- cool dockerfiles☆13Updated 8 years ago
- ASCII Smuggling Hidden Prompt Injection is a novel approach to hacking AI assistants using Unicode Tags. This project demostrate how to u…☆11Updated 9 months ago
- A web front-end for password cracking and analytics☆16Updated 6 years ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆50Updated 3 months ago
- Backscatter and Crosstalk related Side Channel Attacks in modern Optical Networks.☆11Updated last year
- personal fork of OSINT tool recon-ng☆18Updated 7 years ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated last year
- ☆14Updated 4 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆9Updated 3 years ago
- Search Google Dorks like Chad. / Broken link hijacking tool.☆27Updated 2 months ago
- ☆14Updated 7 years ago