salah9003 / Automated-Vulnerability-Scanning-with-Agentic-AILinks
The system consists of multiple AI agents that collaborate to strategize, generate commands, and execute scans based on the client's description, without the need for human intervention.
☆43Updated last year
Alternatives and similar repositories for Automated-Vulnerability-Scanning-with-Agentic-AI
Users that are interested in Automated-Vulnerability-Scanning-with-Agentic-AI are comparing it to the libraries listed below
Sorting:
- Prompt Injections Everywhere☆123Updated 10 months ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆41Updated 9 months ago
- A knowledge source about TTPs used to target GenAI-based systems, copilots and agents☆38Updated 3 months ago
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆100Updated 2 weeks ago
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆122Updated 4 months ago
- A LLM explicitly designed for getting hacked☆149Updated last year
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINT☆37Updated last year
- Short list of indirect prompt injection attacks for OpenAI-based models.☆27Updated 5 months ago
- AI Powered Terminal Based Ethical Hacking Assistant☆67Updated 4 months ago
- ☆62Updated this week
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆46Updated 6 months ago
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆70Updated last week
- A collection of tools that I use in CTF's or for assessments☆98Updated 4 months ago
- ☆77Updated 3 weeks ago
- TruffleHog Explorer, a user-friendly web-based tool to visualize and analyze data extracted using TruffleHog.☆39Updated 4 months ago
- LLM Powered Pentesting for your software☆116Updated last year
- The Arcanum Prompt Injection Taxonomy☆97Updated 3 weeks ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆82Updated last month
- All-sources tool to search websites by favicons☆146Updated 6 months ago
- Penetration Testing AI Assistant based on open source LLMs.☆79Updated last month
- Here are some cool and some unpublished Dorks☆75Updated 4 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated last year
- 🤖 LLM-powered agent for automated Google Dorking in bug hunting & pentesting.☆56Updated 2 weeks ago
- Operation Archive - Saving the history behind Cybercriminal Arrests, Documentation, Raids, Seizures, and more!☆49Updated last week
- https://arxiv.org/abs/2412.02776☆54Updated 6 months ago
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆33Updated last year
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆35Updated last month
- NOT for educational purposes: An MCP server for professional penetration testers including nmap, go/dirbuster, nikto, JtR, wordlist build…☆41Updated last month
- Vulnerability scanner for AWS customer managed policies using ChatGPT☆163Updated 2 years ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆163Updated last year