The system consists of multiple AI agents that collaborate to strategize, generate commands, and execute scans based on the client's description, without the need for human intervention.
☆58Apr 6, 2024Updated 2 years ago
Alternatives and similar repositories for Automated-Vulnerability-Scanning-with-Agentic-AI
Users that are interested in Automated-Vulnerability-Scanning-with-Agentic-AI are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆31Feb 9, 2026Updated 2 months ago
- Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (…☆16Sep 20, 2023Updated 2 years ago
- Scanning Result of MetaScan's AI GPTScan Engine for 13 DefiHacks Projects under 10 Logic Vuln Types☆13Aug 8, 2023Updated 2 years ago
- vidy007's dotfiles☆11Jan 21, 2025Updated last year
- ☆15Mar 6, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Use Wg Gen Web to manage Kilo peers☆10Apr 7, 2021Updated 5 years ago
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- Fast and flexible challenge downloader for all major CTF platforms☆15Oct 20, 2025Updated 6 months ago
- ☆13Sep 15, 2024Updated last year
- ☆18Jun 25, 2024Updated last year
- Enumerate typosquatting, IDN homograph, bitsquatting, and visual spoofing candidates for red team engagements, threat hunting, and brand …☆11Mar 28, 2026Updated last month
- Modern Ansible Management Interface☆18Sep 8, 2025Updated 7 months ago
- Malware that TeamTNT found and removed.☆14Nov 27, 2020Updated 5 years ago
- Fake-Out : Fake-Out is an email spoofing tool created by HackEthics138, with security measures provided by Team Illusion. Thi…☆12Aug 19, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Windows Shell Link (LNK) Proof of Concept☆16Jul 19, 2025Updated 9 months ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55May 7, 2025Updated 11 months ago
- ☆13May 21, 2025Updated 11 months ago
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- ☆10Jun 15, 2024Updated last year
- Pyload RCE with js2py sandbox escape☆18Oct 26, 2024Updated last year
- Hourly Checked and Updated IP Ranges of AWS Servers☆20Feb 27, 2024Updated 2 years ago
- ☆13Nov 18, 2020Updated 5 years ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Torrentpier v2.4.1. CVE-2024-1651. Remote Code Execution (RCE). Exploit.☆15Mar 7, 2024Updated 2 years ago
- LLM powered agents for scanning vulnerabilities on any website - Llama 3 8B, Groq, Selenium, CrewAI, Exa AI☆30Aug 8, 2024Updated last year
- PHP CGI Argument Injection (CVE-2024-4577) RCE☆25Aug 20, 2024Updated last year
- A high-performance domain scanner that discovers active domains by testing multiple Top-Level Domains (TLDs) for given domain names.☆30Apr 20, 2026Updated 2 weeks ago
- A BrainF*ck Inspired Shell Obfuscation Proof-of-Concept☆16Mar 11, 2024Updated 2 years ago
- Netwrix Account Lockout Examiner 4.1 Domain Admin Account Credential Disclosure Vulnerability☆28Nov 11, 2020Updated 5 years ago
- Find alive hosts by scanning IP addresses☆12Jun 18, 2020Updated 5 years ago
- Host Header Vulnerability Scanner Automated Tool☆29Apr 18, 2025Updated last year
- Brew Local Privilege Escalation exploit on Intel macOS☆19Mar 6, 2024Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Exploit for CVE-2024-5009☆13Jul 8, 2024Updated last year
- example using NtCreateUserProcess in rust☆19Jan 20, 2025Updated last year
- Converts a hostname (or URI) to IP address using your local resolver☆26Mar 31, 2024Updated 2 years ago
- ☆13Jun 10, 2023Updated 2 years ago
- LobotoMl is a set of scripts and tools to assess production deployments of ML services☆10May 16, 2022Updated 3 years ago
- A simple Python SSH server that reveals passwords of connecting clients☆32Jul 7, 2017Updated 8 years ago
- ☆16May 29, 2024Updated last year