salah9003 / Automated-Vulnerability-Scanning-with-Agentic-AILinks
The system consists of multiple AI agents that collaborate to strategize, generate commands, and execute scans based on the client's description, without the need for human intervention.
☆53Updated last year
Alternatives and similar repositories for Automated-Vulnerability-Scanning-with-Agentic-AI
Users that are interested in Automated-Vulnerability-Scanning-with-Agentic-AI are comparing it to the libraries listed below
Sorting:
- AI Powered Terminal Based Ethical Hacking Assistant☆85Updated 11 months ago
- Prompt Injections Everywhere☆176Updated last year
- Penetration Testing AI Assistant based on open source LLMs.☆115Updated 9 months ago
- ☆238Updated last year
- Agentic pentest tooling☆126Updated this week
- Curated collection of cybersecurity tools featured in Black Hat Arsenal events.☆77Updated last week
- Discovering Typo Squatting on your domains!☆80Updated last year
- An Interface for AI built for cybersecurity professionals☆93Updated 11 months ago
- 🤖 LLM-powered agent for automated Google Dorking in bug hunting & pentesting.☆222Updated last month
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINT☆37Updated last year
- ☆140Updated last year
- LLM Powered Pentesting for your software☆179Updated 7 months ago
- A custom Google search (to bypass some limitations on google and VPNs)☆116Updated 2 years ago
- Automated OSINT on SwaggerHub☆242Updated 2 years ago
- InfoHound is an OSINT to extract a large amount of data given a web domain name.☆162Updated 3 months ago
- Find S3 AWS/GCP/Azure buckets while surfing. S3DNS acts as DNS server, follows CNAMEs and matches any bucket pattern☆120Updated 4 months ago
- A LLM explicitly designed for getting hacked☆166Updated 2 years ago
- Chrome extension tool for OSINT & Recon☆57Updated last year
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆166Updated 2 years ago
- ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making i…☆160Updated 2 months ago
- Discover and monitor internet assets using favicon hashes across search engines.☆223Updated 3 months ago
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆76Updated 9 months ago
- A blind SQL injection brute forcer☆113Updated 9 months ago
- A guide to LLM hacking: fundamentals, prompt injection, offense, and defense☆182Updated 2 years ago
- Prompts for performing tests on your Kali Linux using Gemini-cli, ChatGPT, DeepSeek, CursorAI, Claude Code, and Copilot.☆203Updated last month
- ☆101Updated 2 months ago
- TerminatorZ is a highly sophisticated and efficient web security tool that scans for top potential vulnerabilities with known CVEs in you…☆293Updated last year
- Cybersecurity Intelligent Pentesting Helper for Ethical Researcher (CIPHER). Fine tuned LLM for penetration testing guidance based on wri…☆35Updated last year
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆243Updated last year
- Red teaming is an attack technique used in cyber security to test how an organisation would respond to a genuine cyber attack. It is done…☆27Updated 9 months ago