sdnewhop / AISecLinks
Cybersecurity of Machine Learning and Artificial Intelligence
☆69Updated 3 years ago
Alternatives and similar repositories for AISec
Users that are interested in AISec are comparing it to the libraries listed below
Sorting:
- SAIVS (Spider Artificial Intelligence Vulnerability Scanner).☆54Updated 5 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Updated 5 years ago
- ☆72Updated 4 years ago
- ☆90Updated 4 years ago
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guide☆21Updated 5 years ago
- Static code analysis tool based on Elasticsearch☆130Updated 5 years ago
- Python script to launch burp scans automatically☆33Updated 4 years ago
- The project is based on Ben Clark's book: Red Team Field Manual.☆57Updated 9 years ago
- Static Token And Credential Scanner☆95Updated 2 years ago
- Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).☆123Updated 2 years ago
- A list of queries and actions that I repeat over and over again☆65Updated 5 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆76Updated 3 years ago
- All the members of bugbounty and infosec. If you don't know who to follow, see!☆35Updated 3 years ago
- In this repository I'll host my research and methodologies for auditing vulnerabilities☆29Updated 6 years ago
- Perform CVE lookup on cvedetails.com☆27Updated 2 years ago
- A very vulnerable implementation of a GraphQL API.☆61Updated 4 years ago
- Core A2P2V functionality (command line based)☆68Updated last year
- Jumpstart multiple WebSocket servers quickly☆32Updated 4 years ago
- automated tool designed to streamline the search and identification of Proofs of Concept (POCs)☆20Updated last year
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆44Updated last year
- Python resource library for creating security related tooling☆79Updated last year
- First iteration of ML based Feedback WAF☆59Updated last year
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆27Updated last year
- Source for Pentester Land☆39Updated 3 years ago
- ☆44Updated 4 years ago
- ☆48Updated 5 years ago
- A compilation of network scanning strategies to find vulnerable devices☆73Updated 3 years ago
- WebStor efficiently enumerates all websites across your organization’s networks and those in your DNS records - including cloud-hosted se…☆156Updated last year
- The objective of this Burp Suite extension is the flexible and dynamic extraction, correlation, and structured presentation of informatio…☆60Updated 3 years ago
- ⚡️ Multiple target ZAP Scanning☆105Updated 2 years ago