santosomar / ai_security
AI Security Research
☆9Updated last year
Alternatives and similar repositories for ai_security:
Users that are interested in ai_security are comparing it to the libraries listed below
- After getting heavy demand on my Crest CPSA. I am sharing my notes on Network Security Assessment from recommended book for CPSA. Please …☆11Updated last year
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆18Updated last year
- ☆8Updated 4 months ago
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆33Updated last year
- Deploy multiple instances of Nessus in docker containers easily☆20Updated 3 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆32Updated 2 weeks ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆20Updated last year
- A Python script to find tenant id an region from a list of domain names.☆12Updated 3 weeks ago
- redteamrecipe.com☆22Updated last year
- A port scanner written in PowerShell☆13Updated 3 years ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆38Updated 5 months ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- A python library to interact with Pwndoc instances for pentest reports generation☆15Updated last week
- A simple utility to fetch freshly updated DNS resolvers☆18Updated last year
- Burp Suite Extension - Trigger actions and reshape HTTP request and response traffic using configurable rules☆15Updated 2 months ago
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- This search engine automates the discovery of sensitive information using customized dorks across GitHub, Google, and Shodan.☆11Updated 4 months ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- Critical Remote Code Execution Vulnerability (CVE-2018-11776) Found in Apache Struts.☆14Updated 4 years ago
- ☆17Updated 2 months ago
- Tomcat backdoor based on CS blog☆27Updated last year
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆12Updated 2 years ago
- Configurable, Community driven, HTTP C2 Profile☆14Updated 2 months ago
- A python script to check if URLs are allowed or disallowed by a robots.txt file.☆21Updated last week
- ☆20Updated last year
- this nuclei template finds back up files☆19Updated 3 months ago
- ☆12Updated last year
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆11Updated 3 years ago