santosomar / ai_security
AI Security Research
☆8Updated last year
Alternatives and similar repositories for ai_security:
Users that are interested in ai_security are comparing it to the libraries listed below
- Computer Network Exploitation (CNE) Field Manual☆13Updated 9 months ago
- ☆16Updated 2 years ago
- Spring cloud gateway code injection : CVE-2022-22947☆10Updated 2 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 2 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆18Updated last year
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- This repository contains a Python client for interfacing with the [crt.sh](https://crt.sh/) website, allowing users to retrieve informati…☆12Updated 4 months ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Updated 3 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆15Updated 5 years ago
- ☆19Updated 2 years ago
- Notes some analysis related to VidarStealer sample☆14Updated 8 months ago
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆11Updated 3 years ago
- Create an AMI with CobaltStrike and related tools.☆8Updated 3 weeks ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated last year
- Web based favicon recon tool made using streamlit.☆10Updated 2 years ago
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆33Updated 10 months ago
- Write-Ups for TryHackMe☆23Updated 3 years ago
- Tomcat backdoor based on CS blog☆27Updated last year
- 📡 Ease file sharing during pentest/CTF 🎸☆12Updated 2 years ago
- Burp Suite Extension - Trigger actions and reshape HTTP request and response traffic using configurable rules☆15Updated last month
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆32Updated this week
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 4 years ago
- A malicious .cab creation tool for CVE-2021-40444☆12Updated 3 years ago
- Passive Reconnaissance Techniques Approach helps for penetration testing and bug bounty hunting by gathering information about a target s…☆12Updated last year
- ☆17Updated 3 years ago
- Reversing Citrix Gateway for XSS☆14Updated last year
- Recon-ng modules for basic OSINT.☆11Updated 2 years ago