santosomar / ai_security
AI Security Research
☆10Updated last year
Alternatives and similar repositories for ai_security:
Users that are interested in ai_security are comparing it to the libraries listed below
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆19Updated last year
- A curated list of Docker resources and projects☆13Updated 11 months ago
- Distributed nmap.☆12Updated last year
- redteamrecipe.com☆23Updated last year
- This repository contains a Python client for interfacing with the [crt.sh](https://crt.sh/) website, allowing users to retrieve informati…☆14Updated 7 months ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- A collection of prompts for people that want to learn more about cybersecurity topics.☆16Updated 2 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆15Updated 3 years ago
- Subdomain Scan (knockpy) in Python3☆11Updated 4 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Updated 4 years ago
- Computer Network Exploitation (CNE) Field Manual☆13Updated last year
- Red Team Projects with chat.openai.com.☆17Updated 2 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 3 years ago
- RabbitMQ exploit and Pentesting guide for penetration tester☆16Updated last year
- Notes some analysis related to VidarStealer sample☆14Updated 11 months ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆19Updated 2 years ago
- A utility to fetch and display dns names from the SSL/TLS cert data☆13Updated last year
- RATs library 2003 to present☆14Updated last year
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆34Updated last week
- ☆8Updated 6 months ago
- The aim of the project is to develop intentionally vulnerable source code in various languages.☆12Updated 4 years ago
- redteaming a simple language model like gpt2. based on anthropic redteaming paper☆8Updated 2 years ago
- ☆12Updated 3 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Updated 3 years ago
- A PowerShell script for helping to find vulnerable settings in AD Group Policy.☆14Updated 6 years ago
- Burpsuite Plugin to bypass strict RePlay protection☆12Updated 4 years ago
- ☆18Updated 5 months ago
- A Python script to find tenant id an region from a list of domain names.☆14Updated 2 months ago
- ☆20Updated 2 years ago
- A tool to check for response status codes with ease☆14Updated last year