salah9003 / Automated-Vulnerability-Scanning-with-Agentic-AI
The system consists of multiple AI agents that collaborate to strategize, generate commands, and execute scans based on the client's description, without the need for human intervention.
☆43Updated last year
Alternatives and similar repositories for Automated-Vulnerability-Scanning-with-Agentic-AI:
Users that are interested in Automated-Vulnerability-Scanning-with-Agentic-AI are comparing it to the libraries listed below
- A LLM explicitly designed for getting hacked☆141Updated last year
- Prompt Injections Everywhere☆115Updated 8 months ago
- The Arcanum Prompt Injection Taxonomy☆55Updated last month
- Cybersecurity AI (CAI), an open Bug Bounty-ready Artificial Intelligence☆99Updated this week
- A knowledge source about TTPs used to target GenAI-based systems, copilots and agents☆32Updated last month
- InfoHound is an OSINT to extract a large amount of data given a web domain name.☆162Updated 11 months ago
- All-sources tool to search websites by favicons☆122Updated 5 months ago
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆46Updated 5 months ago
- Vulnerability scanner for AWS customer managed policies using ChatGPT☆159Updated last year
- AI Powered Terminal Based Ethical Hacking Assistant☆61Updated 2 months ago
- ☆227Updated 9 months ago
- A collection of Cyber Threat Intelligence information gathered from the depths of the clearnet, deep web and dark web.☆90Updated last week
- Chrome extension tool for OSINT & Recon☆53Updated last year
- Web Path Finder☆60Updated last year
- A Discord bot that searches the dark web for your query and returns links and screenshots of the results to your discord channel using ah…☆73Updated 8 months ago
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINT☆37Updated last year
- Penetration Testing AI Assistant based on open source LLMs.☆64Updated this week
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆161Updated last year
- Framework for Monitoring File Ingestion Source for Yara Matches☆46Updated last month
- Discovering Typo Squatting on your domains!☆68Updated 8 months ago
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆70Updated 2 weeks ago
- To perform OSINT on an instagram profile☆72Updated 8 months ago
- It is a project produced to expose the main logic of OSINT-AI tools offered for sale on the DarkWeb☆30Updated last year
- Payloads for Attacking Large Language Models☆79Updated 9 months ago
- An AI-powered application that conducts structured interviews to create and maintain detailed personal profiles across various life aspec…☆28Updated 2 weeks ago
- Here are some cool and some unpublished Dorks☆70Updated 2 months ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆89Updated last year
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆31Updated 10 months ago
- some prompt about cyber security☆194Updated last year
- A command-line tool to query the DeHashed API. Easily search for various parameters like usernames, emails, hashed passwords, IP addresse…☆229Updated last year