salah9003 / Automated-Vulnerability-Scanning-with-Agentic-AI
The system consists of multiple AI agents that collaborate to strategize, generate commands, and execute scans based on the client's description, without the need for human intervention.
☆33Updated 9 months ago
Alternatives and similar repositories for Automated-Vulnerability-Scanning-with-Agentic-AI:
Users that are interested in Automated-Vulnerability-Scanning-with-Agentic-AI are comparing it to the libraries listed below
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆45Updated 2 months ago
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆65Updated this week
- A fast and comprehensive tool for organizational network scanning☆127Updated 9 months ago
- Protection against HTML smuggling attempts.☆85Updated last week
- TorrentSpyder is a command-line utility designed to retrieve Torrent Download History based on a specified IP address.☆10Updated 3 months ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆36Updated 5 months ago
- A Powerful Network Reconnaissance Tool for Security Professionals☆100Updated last month
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated 8 months ago
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆41Updated 2 months ago
- A collection of tools that I use in CTF's or for assessments☆83Updated this week
- Web Path Finder☆61Updated last year
- CVE-2023-43261 - Credential Leakage Through Unprotected System Logs and Weak Password Encryption☆56Updated last year
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINT☆38Updated 11 months ago
- Automates the network enumeration process in a fire-and-forget manner, among many more functions. Aims to be the illest Nmap/masscan wrap…☆46Updated 2 months ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆88Updated 9 months ago
- aws cli pentesting/red team snippets☆32Updated last year
- A LLM explicitly designed for getting hacked☆134Updated last year
- An Interface for AI built for cybersecurity professionals☆87Updated 3 weeks ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆50Updated 10 months ago
- Prompt Injections Everywhere☆99Updated 5 months ago
- Vagrant provisioning scripts to create a simulated network environment for tabletop exercises☆33Updated 2 years ago
- A blind SQL injection brute forcer☆106Updated 2 months ago
- This is an AD pentest tools collection☆53Updated 6 months ago
- A tool to curate compelling news on cloud technologies and cybersecurity. By aggregating information from RSS feeds and Reddit, it identi…☆33Updated 5 months ago
- A multi-cloud DNS record scanner that aims to help cybersecurity/IT analysts identify dangling CNAME records in their cloud DNS services …☆48Updated last year
- Information stealer logs parser☆47Updated 5 months ago
- It is a project produced to expose the main logic of OSINT-AI tools offered for sale on the DarkWeb☆29Updated 9 months ago
- ☆32Updated last month
- Web Penetration Testing Course Materials☆32Updated 8 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆106Updated 2 months ago