santosomar / chatgpt-cybersecurity-promptsLinks
A collection of prompts for people that want to learn more about cybersecurity topics.
☆16Updated 2 years ago
Alternatives and similar repositories for chatgpt-cybersecurity-prompts
Users that are interested in chatgpt-cybersecurity-prompts are comparing it to the libraries listed below
Sorting:
- MINOTAUR: The STRONGEST Secure Prompt EVER! Prompt Security Challenge, Impossible GPT Security, Prompts Cybersecurity, Prompting Vulnerab…☆19Updated last year
- OpenAI Security Console - Python3 AI-powered Cybersecurity Framework☆17Updated 2 years ago
- 🗺 A map of OSINT tools.☆19Updated 2 years ago
- Hacking the Singularity. Deep learning hacking. Weaponizing AI in Offensive security☆100Updated last year
- An astronomical collection of space-related cybersecurity tools 🚀✨☆25Updated 2 years ago
- Automated Pentest Recon Scanner☆14Updated 7 years ago
- Complete Malware Index - Use at your own Risk!☆15Updated 11 months ago
- Official Black Hat Arsenal Security Tools Repository☆19Updated 7 years ago
- Who We Are☆19Updated 11 months ago
- ☆20Updated last year
- Official Athena OS docker base images.☆13Updated 2 months ago
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Social Engin…☆19Updated 3 years ago
- A Sophisticated, Automated, AI-Driven, State-Sponsored Cyber-Espionage/Counter-Espionage & Zero Click AI-Gen Supply Chain Attack Framewor…☆26Updated 3 months ago
- Recon Automation for BugBounties☆11Updated 10 months ago
- Just a better dirbuster☆13Updated 2 years ago
- A certificate transparency log keyword sniffer written in python☆83Updated 2 years ago
- An Effiecent Tool To Change Tor IP's in Seconds,change mac address and clean all logs☆36Updated 3 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆90Updated last year
- razorAP, Bash and Python tool used to generate Fake Access Points for Wi-Fi networks with 802.1X authentication.☆21Updated 10 months ago
- Automation script to download missing tools and configurate kali linux for various cybersecurity categories☆52Updated 5 months ago
- Simple FREE guide to set up TOR stealth and persistence with complete anonymity.☆63Updated 3 years ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆14Updated 2 years ago
- This python program gets all the saved passwords, credit cards and bookmarks from chromium based browsers supports chromium 80 and above!☆11Updated 2 years ago
- OSINT automation for hackers.☆15Updated 2 years ago
- Comprehensive guide to configuring Kali Linux, a Debian-based Linux distribution designed for penetration testers. The guide covers every…☆24Updated 7 months ago
- Source of swisskyrepo.github.io - Public☆25Updated 3 weeks ago
- Interactive shell to execute commands anonymously using Proxychains and Tor☆42Updated 2 years ago
- A comprehensive collection of CyberSecurity PDFs. Guides, Research Papers, Education, Information Security, Network Security, Cryptograph…☆35Updated 10 months ago
- RedTeam - Red Team Tools☆47Updated 2 years ago
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆47Updated 9 months ago