saadi1995 / ollama-hunterLinks
A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.
☆20Updated 8 months ago
Alternatives and similar repositories for ollama-hunter
Users that are interested in ollama-hunter are comparing it to the libraries listed below
Sorting:
- A simple web app to get the latest EPSS data for a CVE ID☆11Updated last month
- ☆20Updated 9 months ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Updated 7 months ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆48Updated 7 months ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Updated last year
- ☆76Updated last year
- Create honeypots for cloud environments☆109Updated 3 months ago
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆51Updated 10 months ago
- Living Off Security Tools☆58Updated 2 months ago
- MCP to help Defenders Detection Engineer Harder and Smarter☆118Updated this week
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆43Updated last year
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆32Updated 2 months ago
- Repo for experimenting and testing MCP server builds for CTI-related research.☆27Updated 8 months ago
- ☆58Updated last month
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆37Updated 5 months ago
- urlyzer is a URL parsing analysis tool.☆24Updated last year
- A not-curated list of cloud hacking labs☆26Updated last year
- Detonate malware on VMs and get logs & detection status☆76Updated last week
- Script for importing Nmap results into a Neo4j Graph Database☆24Updated 8 months ago
- ☆25Updated 2 years ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Updated 10 months ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆56Updated last year
- IP address filter by City☆12Updated last year
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆30Updated last year
- ☆89Updated 2 months ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆53Updated 2 years ago
- Script to test NetSec capabilities.☆21Updated 2 years ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Updated last year
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆42Updated 5 months ago
- A simple tool designed to create Atomic Red Team tests with ease.☆49Updated 10 months ago