salah9003 / Automated-Vulnerability-Scanning-with-Agentic-AILinks
The system consists of multiple AI agents that collaborate to strategize, generate commands, and execute scans based on the client's description, without the need for human intervention.
☆45Updated last year
Alternatives and similar repositories for Automated-Vulnerability-Scanning-with-Agentic-AI
Users that are interested in Automated-Vulnerability-Scanning-with-Agentic-AI are comparing it to the libraries listed below
Sorting:
- Prompt Injections Everywhere☆139Updated last year
- ☆237Updated last year
- A blind SQL injection brute forcer☆109Updated 3 months ago
- 🏴☠️ Hacking Guides, Demos and Proof-of-Concepts 🥷☆200Updated last month
- AI Powered Terminal Based Ethical Hacking Assistant☆73Updated 6 months ago
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆203Updated last month
- Discovering Typo Squatting on your domains!☆71Updated last year
- ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making i…☆123Updated last week
- A LLM explicitly designed for getting hacked☆155Updated 2 years ago
- An Interface for AI built for cybersecurity professionals☆92Updated 5 months ago
- NOT for educational purposes: An MCP server for professional penetration testers including STDIO/HTTP/SSE support, nmap, go/dirbuster, ni…☆69Updated last month
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆44Updated 4 months ago
- Penetration Testing AI Assistant based on open source LLMs.☆90Updated 4 months ago
- The notebook for my talk - ChatGPT: Your Red Teaming Ally☆48Updated last year
- ☆91Updated 2 months ago
- InfoHound is an OSINT to extract a large amount of data given a web domain name.☆163Updated last year
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆34Updated last year
- Find S3 AWS/GCP/Azure buckets while surfing. S3DNS acts as DNS server, follows CNAMEs and matches any bucket pattern☆76Updated last month
- A Powerful Network Reconnaissance Tool for Security Professionals☆101Updated 7 months ago
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINT☆37Updated last year
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆109Updated 2 months ago
- Chrome extension tool for OSINT & Recon☆54Updated last year
- Cybersecurity Intelligent Pentesting Helper for Ethical Researcher (CIPHER). Fine tuned LLM for penetration testing guidance based on wri…☆27Updated 7 months ago
- ☆111Updated last year
- The Shodan MCP Server by ADEO Cybersecurity Services provides cybersecurity professionals with streamlined access to Shodan's powerful re…☆14Updated 4 months ago
- A custom Google search (to bypass some limitations on google and VPNs)☆114Updated 2 years ago
- ☆187Updated 3 months ago
- LLM Powered Pentesting for your software☆148Updated last month
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆164Updated last year
- ☆79Updated 2 years ago