santosomar / chatgpt-cybersecurity-promptsLinks
A collection of prompts for people that want to learn more about cybersecurity topics.
☆16Updated 2 years ago
Alternatives and similar repositories for chatgpt-cybersecurity-prompts
Users that are interested in chatgpt-cybersecurity-prompts are comparing it to the libraries listed below
Sorting:
- MINOTAUR: The STRONGEST Secure Prompt EVER! Prompt Security Challenge, Impossible GPT Security, Prompts Cybersecurity, Prompting Vulnerab…☆17Updated last year
- OpenAI Security Console - Python3 AI-powered Cybersecurity Framework☆17Updated 2 years ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆15Updated 3 years ago
- Automated Pentest Recon Scanner☆14Updated 7 years ago
- 🗺 A map of OSINT tools.☆18Updated 2 years ago
- A curated list of GPT agents for cybersecurity☆10Updated 9 months ago
- Hacking the Singularity. Deep learning hacking. Weaponizing AI in Offensive security☆99Updated last year
- Official Black Hat Arsenal Security Tools Repository☆19Updated 7 years ago
- A Sophisticated, Automated, AI-Driven, State-Sponsored Cyber-Espionage/Counter-Espionage & Zero Click AI-Gen Supply Chain Attack Framewor…☆23Updated 2 months ago
- Just a better dirbuster☆13Updated 2 years ago
- Source of swisskyrepo.github.io - Public☆25Updated this week
- Sphinx.bot is a platform for collecting data leaks. All information recorded here is publicly available on the web. Any malicious use of …☆46Updated last year
- A OSINT tool to obtain a target's phone number just by having his email address☆30Updated 5 years ago
- pwndb is a tool that looks for leaked passwords from a dark web breach database given a user or domain.☆38Updated 5 years ago
- BlueTeam, RedTeam, Bug bounty, CTI, OSINT, Threat Hunting, Network and Web Recon, Discovery, Enumeration, Vulnerability Mapping, Exploita…☆54Updated 3 months ago
- Who We Are☆19Updated 10 months ago
- An Effiecent Tool To Change Tor IP's in Seconds,change mac address and clean all logs☆36Updated 3 years ago
- An Interface for AI built for cybersecurity professionals☆92Updated 4 months ago
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.☆68Updated 2 years ago
- ☆10Updated 3 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 2 years ago
- WebHook for Red Team☆26Updated 4 years ago
- Python tool to detect critical information (passwords, usernames, strings connectios, etc) in public repositories. GITHUB Hacking.☆21Updated 3 years ago
- Official Athena OS docker base images.☆13Updated 2 months ago
- Bypass 4xx HTTP response status codes and more. Based on PycURL.☆15Updated 3 years ago
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Social Engin…☆19Updated 3 years ago
- Automation script to download missing tools and configurate kali linux for various cybersecurity categories☆53Updated 4 months ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆90Updated last year
- want to remove sensitive data from photos or even view it? use autoexif to easily help you do that no more remembering syntaxs with this …☆37Updated 2 months ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆14Updated 2 years ago