sdnewhop / AISecLinks
Cybersecurity of Machine Learning and Artificial Intelligence
☆73Updated 3 years ago
Alternatives and similar repositories for AISec
Users that are interested in AISec are comparing it to the libraries listed below
Sorting:
- First iteration of ML based Feedback WAF☆59Updated last year
- Just a bunch of useful links to take (and pass!) OSCP☆20Updated 5 years ago
- Code repository for "Machine Learning For Red Team Hackers".☆32Updated 5 years ago
- Perform CVE lookup on cvedetails.com☆24Updated last year
- ☆72Updated 3 years ago
- SAIVS (Spider Artificial Intelligence Vulnerability Scanner).☆55Updated 4 years ago
- A compilation of network scanning strategies to find vulnerable devices☆73Updated 2 years ago
- DEF CON 26 Workshop - Attacking & Auditing Docker Containers Using Open Source☆108Updated 5 years ago
- ☆43Updated 2 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago
- AWS Security Checks☆39Updated 7 years ago
- Privilege Escalation MindMap☆15Updated 4 years ago
- Appsecco training course content on Attacking and Auditing Dockers Containers and Kubernetes Clusters☆14Updated 5 years ago
- ☆48Updated 4 years ago
- A write-up of the famous vulnerable Juice Shop by bkimminich☆21Updated 8 years ago
- dns rebind tool with custom scripts☆82Updated 2 years ago
- ☆51Updated 4 months ago
- Static code analysis tool based on Elasticsearch☆129Updated 4 years ago
- Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities☆44Updated 2 years ago
- A list of queries and actions that I repeat over and over again☆64Updated 4 years ago
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆26Updated 11 months ago
- Collection of quirky behaviours of code and the CTF challenges that I made around them.☆26Updated 4 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆75Updated 2 years ago
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guide☆20Updated 4 years ago
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Updated last year
- Automated XSS Vulnerability Finder☆31Updated 4 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆42Updated last year
- Weaponizing Live CT logs for automated monitoring of assets☆134Updated 3 years ago
- ☆71Updated 4 years ago
- A penetration testing and vulnerability management application written using the powerful django framework.☆30Updated last year