☆36Apr 10, 2026Updated last week
Alternatives and similar repositories for ArtificialDiaries
Users that are interested in ArtificialDiaries are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆40Jan 16, 2026Updated 3 months ago
- An extended version of SecureBERT, trained on top of both base and large version of RoBERTa using 10 GB cybersecurity-related data☆32Jan 26, 2024Updated 2 years ago
- LLM agent that autonomously hacks websites☆16May 30, 2024Updated last year
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆96Apr 12, 2026Updated last week
- Point of Concept: To help to automate the collection of evidence for SOC 2 Audits and etc.☆11May 13, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- This repo contains the codes for the experiments of the paper "AutoPenBench: Benchmarking Generative Agents for Penetration Testing".☆14Oct 28, 2025Updated 5 months ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- A security-first MCP server empowering AI agents to orchestrate Ghidra, Radare2, and YARA for automated reverse engineering.☆55Apr 11, 2026Updated last week
- [42-b3yond-6ug] This repository hosts BugBuster, our team’s submission to the AI Cyber Challenge Final Competition.☆30Aug 19, 2025Updated 7 months ago
- ☆13Jun 1, 2021Updated 4 years ago
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 9 years ago
- The Pentest Agent System is an autonomous penetration testing framework built on the MITRE ATT&CK framework.☆30Apr 16, 2025Updated last year
- Python object interface to requests/responses recorded by Burp Suite☆37Jan 21, 2020Updated 6 years ago
- Teensy code to brute force a keylogger's unlock code☆15Sep 5, 2016Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆11Apr 18, 2018Updated 8 years ago
- ☆151Mar 31, 2026Updated 2 weeks ago
- The goal of this repo is to become a benchmark for pentesting☆22Oct 25, 2024Updated last year
- Mimosa Framework to abuse EPC functionality on CISCO Routers.☆30Dec 12, 2024Updated last year
- ⚡ AI-powered directory listing scanner that hunts for exposed secrets and classifies security risks.☆38Sep 18, 2025Updated 7 months ago
- Injecting failures into BGP.☆10Dec 6, 2015Updated 10 years ago
- SQL injection detection engine by tokenzing and syntax analysis, like SQLChop☆10May 8, 2017Updated 8 years ago
- Automatically exported from code.google.com/p/fuzzdb☆14Jun 23, 2015Updated 10 years ago
- LLM Supported Attack Scenario Creator from Code Review☆14Oct 22, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- PoC ActiveX SVG Document Execution☆21Nov 8, 2018Updated 7 years ago
- ☆23Dec 16, 2024Updated last year
- CADGMM (PAKDD2020)☆11Jan 2, 2021Updated 5 years ago
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15May 23, 2017Updated 8 years ago
- Code for the paper "AICrypto: A Comprehensive Benchmark for Evaluating Cryptography Capabilities of Large Language Models"☆30Sep 27, 2025Updated 6 months ago
- Secure Coding Rules for Claude Code with a particular emphasis on AIML projects☆108Feb 14, 2026Updated 2 months ago
- OSINT Web Page Finder☆11May 20, 2020Updated 5 years ago
- Effective go programming☆13Dec 2, 2015Updated 10 years ago
- Syn flood implementation with raw sockets.☆13Nov 24, 2014Updated 11 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆24Dec 16, 2021Updated 4 years ago
- A set of bash scripts for offensive security pentesting. (Machine with Kali reccomended)☆13Sep 30, 2016Updated 9 years ago
- C code metamorphic obfuscator☆13Feb 20, 2015Updated 11 years ago
- HackTheWeb is a production-ready, AI-powered web application penetration testing tool designed for security professionals and ethical hac…☆33Oct 5, 2025Updated 6 months ago
- kCFI Documentation☆15Apr 18, 2017Updated 9 years ago
- MCP Snitch is a macOS application that intercepts and monitors MCP server communications, providing security analysis, access control, an…☆93Oct 14, 2025Updated 6 months ago
- Do you want to learn AI Security but don't know where to start ? Take a look at this map.☆31Apr 23, 2024Updated last year