Best AI tools for< Security Consultant >
Infographic
37 - AI tool Sites
Remy
Remy is an AI-powered platform designed to help product security and compliance teams resolve security risks early. It offers scalable design review capabilities, automates review initiation, generates tailored questions, and provides clear metrics and audit trails. Remy aims to augment and scale product security teams by ensuring full visibility on risky engineering plans and automating tedious review processes. The platform is built for enterprise readiness, offering SSO for convenient logins, scalability, and customization.
Ferret
Ferret is an AI-powered relationship intelligence tool that provides curated relationship intelligence and monitoring to help users avoid high-risk individuals and spot promising opportunities. It uses AI and proprietary data to offer total transparency into personal and professional networks, uncovering information such as news archives, white-collar crime, corporate ownership, legal records, and more.
Vibe AI
Vibe AI is an AI-powered cybersecurity product designed to secure business data by utilizing advanced AI technologies. It offers real-time alert notifications and developer-friendly APIs to protect digital assets from potential threats. Vibe AI provides military-grade security, automatic threat detection, and flexible subscription plans to meet the security needs of businesses. It helps businesses safeguard their data, ensure compliance with industry standards, and build trust with customers.
icetana
icetana is an AI Security Video Analytics Software that offers Safety and Security Analytics, Forensic Quick Find, Facial Recognition, Licence Plate Recognition, and GPT Event Finder. The core product connects with existing security cameras to detect unusual or interesting events across large surveillance networks. It helps users stay ahead of security incidents with immediate alerts and allows cameras to detect potential security breaches before they happen. icetana AI enhances security and safety through advanced surveillance, covering theft, medical emergencies, routine monitoring, and prevention. The AI continuously evolves, offers real-time event detection, reduces false alarms, and is easy to configure with user-friendly setup.
DryRun Security
DryRun Security is an AI-powered security tool designed to provide developers with security context and analysis for code changes in real-time. It offers a suite of analyzers to identify risky code changes, such as SQL injection, command injection, and sensitive file modifications. The tool integrates seamlessly with GitHub repositories, offering developers a security buddy to enhance code security without slowing down the development process. DryRun Security aims to improve developer productivity, protect code repositories, and provide security context before code merges.
MobiHeals
MobiHeals is a comprehensive security vulnerability analysis mobile application that offers cloud-based static and dynamic application security testing for mobile apps. It provides cost-efficient and scalable security testing on the cloud, compliance with global cybersecurity guidelines, and integrated vulnerability assessment in one platform. Users can continuously analyze and detect security vulnerabilities in the mobile application source code, perform manual and automated testing, and receive actionable reports. MobiHeals helps users manage security vulnerabilities and offers an introductory offer for 30 days with various security analysis features.
DevOps Security Platform
DevOps Security Platform is an AI-native security tool designed to automate security requirements definition, enforcement, risk assessments, and threat modeling. It helps companies secure their applications by identifying risks early in the Software Development Lifecycle and enforcing security controls effectively. The platform offers innovative features, AI-generated questionnaires, and the ability to customize, automate, and integrate security processes. DevOps Security Platform aims to empower security champions and prevent security vulnerabilities through a centralized and automated approach.
Ambient.ai
Ambient.ai is an AI-powered physical security software that simplifies and automates security processes. It helps in detecting threats in real-time, auto-clearing false alarms, accelerating investigations, and monitoring for various threats 24/7. The software is trusted by leading security teams worldwide and offers rich integration ecosystem, detections for a spectrum of threats, unparalleled operational efficiency, and enterprise-grade privacy.
Ascento
Ascento is an AI-powered robotics solution that enhances security by utilizing robotics and AI technology to secure assets and provide quantitative insights of premises. The application offers features such as detecting people on premises, verifying perimeter integrity, recording property lights, scanning for thermal anomalies, controlling parking lots, and checking doors and windows. Ascento provides advantages like faster threat detection with greater accuracy, cost reduction, autonomous operation, all-terrain capabilities, and comprehensive Robotics-as-a-Service solution. However, some disadvantages include the need for immediate cost-benefits, training and onboarding requirements, and potential limitations in certain weather conditions.
Greip
Greip is an AI-powered fraud prevention tool that offers a range of services to detect and prevent fraudulent activities in payments, validate card and IBAN details, detect profanity in text, identify VPN/proxy connections, provide IP location intelligence, and more. It combines AI-driven transaction analysis with advanced technology to safeguard financial security and enhance data integrity. Greip's services are trusted by businesses worldwide for secure and reliable protection against fraud.
Lakera
Lakera is the world's most advanced AI security platform that offers cutting-edge solutions to safeguard GenAI applications against various security threats. Lakera provides real-time security controls, stress-testing for AI systems, and protection against prompt attacks, data loss, and insecure content. The platform is powered by a proprietary AI threat database and aligns with global AI security frameworks to ensure top-notch security standards. Lakera is suitable for security teams, product teams, and LLM builders looking to secure their AI applications effectively and efficiently.
Vercel Security Checkpoint
Vercel Security Checkpoint is a web application that provides a security verification process for users accessing the Vercel platform. It ensures the safety and integrity of the platform by verifying the user's browser and enabling JavaScript before proceeding. The checkpoint serves as a protective measure to prevent unauthorized access and potential security threats.
PROTECTSTAR
PROTECTSTAR is an AI-powered cybersecurity application that offers Secure Erasure, Anti Spy, Antivirus AI, and Firewall AI features to protect users from cyber threats. With a focus on privacy and security, PROTECTSTAR aims to provide innovative products using Artificial Intelligence technology. The application has been trusted by over 7 million satisfied users globally and is known for its outstanding detection rate of 99.956%. PROTECTSTAR is committed to environmental sustainability and energy efficiency, as evidenced by its dark mode feature to reduce energy consumption and become CO2-neutral.
Kami Home
Kami Home is an AI-powered security application that provides effortless safety and security for homes. It offers smart alerts, secure cloud video storage, and a Pro Security Alarm system with 24/7 emergency response. The application uses AI-vision to detect humans, vehicles, and animals, ensuring that users receive custom alerts for relevant activities. With features like Fall Detect for seniors living at home, Kami Home aims to protect families and provide peace of mind through advanced technology.
Immunifai
Immunifai is a cybersecurity company that provides AI-powered threat detection and response solutions. The company's mission is to make the world a safer place by protecting organizations from cyberattacks. Immunifai's platform uses machine learning and artificial intelligence to identify and respond to threats in real time. The company's solutions are used by a variety of organizations, including Fortune 500 companies, government agencies, and financial institutions.
moderation.dev
moderation.dev is an AI tool that offers domain-specific guardrails to help organizations identify and manage risks efficiently. By leveraging AI technology, the tool provides custom guardrail models in just one click. It specializes in predicting risks associated with AI chatbots and creating models to intercept queries that a traditional chatbot might struggle to answer accurately.
Blackbird.AI
Blackbird.AI is a narrative and risk intelligence platform that helps organizations identify and protect against narrative attacks created by misinformation and disinformation. The platform offers a range of solutions tailored to different industries and roles, enabling users to analyze threats in text, images, and memes across various sources such as social media, news, and the dark web. By providing context and clarity for strategic decision-making, Blackbird.AI empowers organizations to proactively manage and mitigate the impact of narrative attacks on their reputation and financial stability.
Elie Bursztein AI Cybersecurity Platform
The website is a platform managed by Dr. Elie Bursztein, the Google & DeepMind AI Cybersecurity technical and research lead. It features a collection of publications, blog posts, talks, and press releases related to cybersecurity, artificial intelligence, and technology. Dr. Bursztein shares insights and research findings on various topics such as secure AI workflows, language models in cybersecurity, hate and harassment online, and more. Visitors can explore recent content and subscribe to receive cutting-edge research directly in their inbox.
OneTrust
OneTrust is a Trust Intelligence Cloud Solutions platform that leverages data and artificial intelligence to drive trusted innovation across privacy, security, and ethics initiatives. It offers a comprehensive suite of solutions for privacy management, data discovery, security, consent and preferences, AI governance, technology risk and compliance, compliance automation, third-party risk, and ethics program management. With over 14,000 customers worldwide, OneTrust helps organizations manage risk, ensure compliance, and build trust through responsible data and AI usage.
Helsing
Helsing is an AI tool designed to serve and protect democracies by leveraging artificial intelligence technology. The company focuses on developing software-first solutions that enhance defense capabilities and safeguard democratic values. Helsing collaborates with industry and governments to integrate advanced AI with hardware platforms, aiming to achieve technological leadership in the defense sector. The team at Helsing comprises experts with diverse backgrounds in software, defense, intelligence, and artificial intelligence, united by a shared commitment to upholding democratic principles.
MineOS
MineOS is an automation-driven platform that focuses on privacy, security, and compliance. It offers a comprehensive suite of tools and solutions to help businesses manage their data privacy needs efficiently. By leveraging AI and special discovery methods, MineOS adapts unique data processes to universal privacy standards seamlessly. The platform provides features such as data mapping, AI governance, DSR automations, consent management, and security & compliance solutions to ensure data visibility and governance. MineOS is recognized as the industry's #1 rated data governance platform, offering cost-effective control of data systems and centralizing data subject request handling.
Fletch
Fletch is the world's first cyber threat AI application that helps users stay ahead of cyber threats by automating busywork with AI agents. It continuously trends the threat landscape, forecasts impact, prioritizes alerts, generates tailored advice, and provides daily proactive insights to guide users in defending against threats. Fletch filters and prioritizes alerts, uncovers weaknesses in SaaS supply chains, and offers timely tactical advice to act fast in critical moments. The application also assists in articulating threat messages and provides instant answers through AskFletch chat. Fletch integrates with existing tools, simplifying users' lives and offering hands-on guidance for businesses of all sizes.
CUBE3.AI
CUBE3.AI is a real-time crypto fraud prevention tool that utilizes AI technology to identify and prevent various types of fraudulent activities in the blockchain ecosystem. It offers features such as risk assessment, real-time transaction security, automated protection, instant alerts, and seamless compliance management. The tool helps users protect their assets, customers, and reputation by proactively detecting and blocking fraud in real-time.
Censornet
The website is an AI-powered cybersecurity platform that aims to empower and secure every user and every action. It provides total protection through an integrated cloud platform, offering features such as secure access to web and cloud apps, threat detection and mitigation, advanced data protection, secure remote worker solutions, and AI-powered security leveraging intelligence about user activity and devices. The platform helps businesses anticipate threats, manage vulnerabilities, and protect users worldwide.
Logically
Logically is an AI-powered platform that helps governments, NGOs, and enterprise organizations detect and address harmful and deliberately inaccurate information online. The platform combines artificial intelligence with human expertise to deliver actionable insights and reduce the harms associated with misleading or deceptive information. Logically offers services such as Analyst Services, Logically Intelligence, Point Solutions, and Trust and Safety, focusing on threat detection, online narrative detection, intelligence reports, and harm reduction. The platform is known for its expertise in analysis, data science, and government affairs, providing solutions for various sectors including Corporate, Defense, Digital Platforms, Elections, National Security, and NGO Solutions.
SentinelOne
SentinelOne is an advanced enterprise cybersecurity AI platform that offers a comprehensive suite of AI-powered security solutions for endpoint, cloud, and identity protection. The platform leverages artificial intelligence to anticipate threats, manage vulnerabilities, and protect resources across the entire enterprise ecosystem. With features such as Singularity XDR, Purple AI, and AI-SIEM, SentinelOne empowers security teams to detect and respond to cyber threats in real-time. The platform is trusted by leading enterprises worldwide and has received industry recognition for its innovative approach to cybersecurity.
Control Audits
Control Audits is an AI-powered platform that helps organizations comply with AI & Cyber Security standards. It provides a comprehensive solution for AI and Cyber Security Governance, Risk, and Compliance, offering features such as single pane view, teamwork integration, effortless implementation, seamless task management, and more. The platform is designed to simplify the implementation and compliance process, ensuring that organizations meet standards like ISO 42001, NIST AI RMF, ISO 27001, and others. Control Audits aims to make AI and Cyber Security management efficient and effective for businesses of all sizes.
SentinelOne
SentinelOne is an advanced enterprise cybersecurity AI platform that offers a comprehensive suite of AI-powered security solutions for endpoint, cloud, and identity protection. The platform leverages AI technology to anticipate threats, manage vulnerabilities, and protect resources across the enterprise ecosystem. SentinelOne provides real-time threat hunting, managed services, and actionable insights through its unified data lake, empowering security teams to respond effectively to cyber threats. With a focus on automation, efficiency, and value maximization, SentinelOne is a trusted cybersecurity solution for leading enterprises worldwide.
Vultron Solution
Vultron Solution is an AI tool designed for Federal Proposal Development, offering unparalleled AI capabilities to compress proposal production timeframes, increase revenue, and enhance proposal quality. The tool utilizes proprietary multi-domain models to deliver unique and high-quality content tailored to each organization's needs. With a focus on security and efficiency, Vultron is trusted by leading government contractors to streamline the proposal development process and drive business growth.
Relyance AI
Relyance AI is a platform that offers 360 Data Governance and Trust solutions. It helps businesses safeguard against fines and reputation damage while enhancing customer trust to drive business growth. The platform provides visibility into enterprise-wide data processing, ensuring compliance with regulatory and customer obligations. Relyance AI uses AI-powered risk insights to proactively identify and address risks, offering a unified trust and governance infrastructure. It offers features such as data inventory and mapping, automated assessments, security posture management, and vendor risk management. The platform is designed to streamline data governance processes, reduce costs, and improve operational efficiency.
AI Bot Eye
AI Bot Eye is an AI-based security system that seamlessly integrates with existing CCTV systems to deliver intelligent insights. From AI-powered Fire Detection to Real-Time Intrusion Alerts, AI Bot Eye elevates security systems with cutting-edge AI technology. The application offers features such as Intrusion Detection, Face Recognition, Fire and Smoke Detection, Speed Cam Mode, Safety Kit Detection, HeatMaps Insights, Foot Traffic Analysis, and Numberplate recognition. AI Bot Eye provides advantages like real-time alerts, enhanced security, efficient traffic monitoring, worker compliance monitoring, and optimized operational efficiency. However, the application has disadvantages such as potential false alarms, initial setup complexity, and dependency on existing CCTV infrastructure. The FAQ section addresses common queries about the application, including integration, customization, and compatibility. AI Bot Eye is suitable for jobs such as security guard, surveillance analyst, system integrator, security consultant, and safety officer. The AI keywords associated with the application include AI-based security system, CCTV integration, intrusion detection, and video analytics. Users can utilize AI Bot Eye for tasks like monitor intrusion, analyze foot traffic, detect fire, recognize faces, and manage vehicle entry.
Start Left® Security
Start Left® Security is an AI-driven application security posture management platform that empowers product teams to automate secure-by-design software from people to cloud. The platform integrates security into every facet of the organization, offering a unified solution that aligns with business goals, fosters continuous improvement, and drives innovation. Start Left® Security provides a gamified DevSecOps experience with comprehensive security capabilities like SCA, SBOM, SAST, DAST, Container Security, IaC security, ASPM, and more.
ChatWithCloud
ChatWithCloud is a command-line interface (CLI) tool that enables users to interact with AWS Cloud using natural language within the Terminal, powered by generative AI. It allows users to perform various tasks such as cost analysis, security analysis, troubleshooting, and fixing infrastructure issues without the need for an OpenAI API Key. The tool offers both a lifetime license option and a managed subscription model for users' convenience.
ArcadianAI
ArcadianAI is a modern security monitoring platform that offers easy and affordable solutions for businesses and individuals. The platform provides security cameras, crime maps, and a 30-day free trial for users to experience its features. ArcadianAI uses AI technology for intrusion detection, smart alerts analytics, AI heatmaps search, and AI detection of people. The platform aims to enhance security measures by intelligently contextualizing, analyzing, and safeguarding premises in real-time using existing CCTV footage.
VOLT AI
VOLT AI is a cloud-based enterprise security application that utilizes advanced AI technology to intercept threats in real-time. The application offers solutions for various industries such as education, corporate, and cities, focusing on perimeter security, medical emergencies, and weapons detection. VOLT AI provides features like unified cameras, video intelligence, real-time notifications, automated escalations, and digital twin creation for advanced situational awareness. The application aims to enhance safety and security by detecting security risks and notifying users promptly.
Bagel
Bagel is an AI & Cryptography Research Lab that focuses on making open source AI monetizable by leveraging novel cryptography techniques. Their innovative fine-tuning technology tracks the evolution of AI models, ensuring every contribution is rewarded. Bagel is built for autonomous AIs with large resource requirements and offers permissionless infrastructure for seamless information flow between machines and humans. The lab is dedicated to privacy-preserving machine learning through advanced cryptography schemes.
Masterhackers
Masterhackers is an all-in-one cybersecurity application designed to help cybersecurity professionals and students prepare for certifications and interviews. The platform offers a comprehensive set of tools and resources, including practice tests, flashcards, mock interviews, and personalized feedback with AI. Trusted by students worldwide, Masterhackers aims to enhance users' cybersecurity skills and knowledge through interactive learning experiences.
22 - Open Source Tools
Awesome_GPT_Super_Prompting
Awesome_GPT_Super_Prompting is a repository that provides resources related to Jailbreaks, Leaks, Injections, Libraries, Attack, Defense, and Prompt Engineering. It includes information on ChatGPT Jailbreaks, GPT Assistants Prompt Leaks, GPTs Prompt Injection, LLM Prompt Security, Super Prompts, Prompt Hack, Prompt Security, Ai Prompt Engineering, and Adversarial Machine Learning. The repository contains curated lists of repositories, tools, and resources related to GPTs, prompt engineering, prompt libraries, and secure prompting. It also offers insights into Cyber-Albsecop GPT Agents and Super Prompts for custom GPT usage.
specification
OWASP CycloneDX is a full-stack Bill of Materials (BOM) standard that provides advanced supply chain capabilities for cyber risk reduction. The specification supports various types of Bill of Materials including Software, Hardware, Machine Learning, Cryptography, Manufacturing, and Operations. It also includes support for Vulnerability Disclosure Reports, Vulnerability Exploitability eXchange, and CycloneDX Attestations. CycloneDX helps organizations accurately inventory all components used in software development to identify risks, enhance transparency, and enable rapid impact analysis. The project is managed by the CycloneDX Core Working Group under the OWASP Foundation and is supported by the global information security community.
airgeddon
Airgeddon is a versatile bash script designed for Linux systems to conduct wireless network audits. It provides a comprehensive set of features and tools for auditing and securing wireless networks. The script is user-friendly and offers functionalities such as scanning, capturing handshakes, deauth attacks, and more. Airgeddon is regularly updated and supported, making it a valuable tool for both security professionals and enthusiasts.
trickPrompt-engine
This repository contains a vulnerability mining engine based on GPT technology. The engine is designed to identify logic vulnerabilities in code by utilizing task-driven prompts. It does not require prior knowledge or fine-tuning and focuses on prompt design rather than model design. The tool is effective in real-world projects and should not be used for academic vulnerability testing. It supports scanning projects in various languages, with current support for Solidity. The engine is configured through prompts and environment settings, enabling users to scan for vulnerabilities in their codebase. Future updates aim to optimize code structure, add more language support, and enhance usability through command line mode. The tool has received a significant audit bounty of $50,000+ as of May 2024.
PentestGPT
PentestGPT is a penetration testing tool empowered by ChatGPT, designed to automate the penetration testing process. It operates interactively to guide penetration testers in overall progress and specific operations. The tool supports solving easy to medium HackTheBox machines and other CTF challenges. Users can use PentestGPT to perform tasks like testing connections, using different reasoning models, discussing with the tool, searching on Google, and generating reports. It also supports local LLMs with custom parsers for advanced users.
AIRAVAT
AIRAVAT is a multifunctional Android Remote Access Tool (RAT) with a GUI-based Web Panel that does not require port forwarding. It allows users to access various features on the victim's device, such as reading files, downloading media, retrieving system information, managing applications, SMS, call logs, contacts, notifications, keylogging, admin permissions, phishing, audio recording, music playback, device control (vibration, torch light, wallpaper), executing shell commands, clipboard text retrieval, URL launching, and background operation. The tool requires a Firebase account and tools like ApkEasy Tool or ApkTool M for building. Users can set up Firebase, host the web panel, modify Instagram.apk for RAT functionality, and connect the victim's device to the web panel. The tool is intended for educational purposes only, and users are solely responsible for its use.
airgorah
Airgorah is a WiFi security auditing software written in Rust that utilizes the aircrack-ng tools suite. It allows users to capture WiFi traffic, discover connected clients, perform deauthentication attacks, capture handshakes, and crack access point passwords. The software is designed for testing and discovering flaws in networks owned by the user, and requires root privileges to run on Linux systems with a wireless network card supporting monitor mode and packet injection. Airgorah is not responsible for any illegal activities conducted with the software.
galah
Galah is an LLM-powered web honeypot designed to mimic various applications and dynamically respond to arbitrary HTTP requests. It supports multiple LLM providers, including OpenAI. Unlike traditional web honeypots, Galah dynamically crafts responses for any HTTP request, caching them to reduce repetitive generation and API costs. The honeypot's configuration is crucial, directing the LLM to produce responses in a specified JSON format. Note that Galah is a weekend project exploring LLM capabilities and not intended for production use, as it may be identifiable through network fingerprinting and non-standard responses.
stride-gpt
STRIDE GPT is an AI-powered threat modelling tool that leverages Large Language Models (LLMs) to generate threat models and attack trees for a given application based on the STRIDE methodology. Users provide application details, such as the application type, authentication methods, and whether the application is internet-facing or processes sensitive data. The model then generates its output based on the provided information. It features a simple and user-friendly interface, supports multi-modal threat modelling, generates attack trees, suggests possible mitigations for identified threats, and does not store application details. STRIDE GPT can be accessed via OpenAI API, Azure OpenAI Service, Google AI API, or Mistral API. It is available as a Docker container image for easy deployment.
Evilginx3-Phishlets
This repository contains custom Evilginx phishlets that are meticulously crafted and updated for real-world applications. It also offers an advanced course, EvilGoPhish Mastery, focusing on phishing and smishing techniques using EvilGoPhish 3.0. The course complements the repository by providing in-depth guidance on deploying these scripts for red team phishing and smishing campaigns.
agentic_security
Agentic Security is an open-source vulnerability scanner designed for safety scanning, offering customizable rule sets and agent-based attacks. It provides comprehensive fuzzing for any LLMs, LLM API integration, and stress testing with a wide range of fuzzing and attack techniques. The tool is not a foolproof solution but aims to enhance security measures against potential threats. It offers installation via pip and supports quick start commands for easy setup. Users can utilize the tool for LLM integration, adding custom datasets, running CI checks, extending dataset collections, and dynamic datasets with mutations. The tool also includes a probe endpoint for integration testing. The roadmap includes expanding dataset variety, introducing new attack vectors, developing an attacker LLM, and integrating OWASP Top 10 classification.
pwnagotchi
Pwnagotchi is an AI tool leveraging bettercap to learn from WiFi environments and maximize crackable WPA key material. It uses LSTM with MLP feature extractor for A2C agent, learning over epochs to improve performance in various WiFi environments. Units can cooperate using a custom parasite protocol. Visit https://www.pwnagotchi.ai for documentation and community links.
HaE
HaE is a framework project in the field of network security (data security) that combines artificial intelligence (AI) large models to achieve highlighting and information extraction of HTTP messages (including WebSocket). It aims to reduce testing time, focus on valuable and meaningful messages, and improve vulnerability discovery efficiency. The project provides a clear and visual interface design, simple interface interaction, and centralized data panel for querying and extracting information. It also features built-in color upgrade algorithm, one-click export/import of data, and integration of AI large models API for optimized data processing.
sploitcraft
SploitCraft is a curated collection of security exploits, penetration testing techniques, and vulnerability demonstrations intended to help professionals and enthusiasts understand and demonstrate the latest in cybersecurity threats and offensive techniques. The repository is organized into folders based on specific topics, each containing directories and detailed READMEs with step-by-step instructions. Contributions from the community are welcome, with a focus on adding new proof of concepts or expanding existing ones while adhering to the current structure and format of the repository.
CJA_Comprehensive_Jailbreak_Assessment
This public repository contains the paper 'Comprehensive Assessment of Jailbreak Attacks Against LLMs'. It provides a labeling method to label results using Python and offers the opportunity to submit evaluation results to the leaderboard. Full codes will be released after the paper is accepted.
PyWxDump
PyWxDump is a Python tool designed for obtaining WeChat account information, decrypting databases, viewing WeChat chats, and exporting chats as HTML backups. It provides core features such as extracting base address offsets of various WeChat data, decrypting databases, and combining multiple database types for unified viewing. Additionally, it offers extended functions like viewing chat history through the web, exporting chat logs in different formats, and remote viewing of WeChat chat history. The tool also includes document classes for database field descriptions, base address offset methods, and decryption methods for MAC databases. PyWxDump is suitable for network security, daily backup archiving, remote chat history viewing, and more.
aiosmb
aiosmb is a fully asynchronous SMB library written in pure Python, supporting Python 3.7 and above. It offers various authentication methods such as Kerberos, NTLM, SSPI, and NEGOEX. The library supports connections over TCP and QUIC protocols, with proxy support for SOCKS4 and SOCKS5. Users can specify an SMB connection using a URL format, making it easier to authenticate and connect to SMB hosts. The project aims to implement DCERPC features, VSS mountpoint operations, and other enhancements in the future. It is inspired by Impacket and AzureADJoinedMachinePTC projects.
SecReport
SecReport is a platform for collaborative information security penetration testing report writing and exporting, powered by ChatGPT. It standardizes penetration testing processes, allows multiple users to edit reports, offers custom export templates, generates vulnerability summaries and fix suggestions using ChatGPT, and provides APP security compliance testing reports. The tool aims to streamline the process of creating and managing security reports for penetration testing and compliance purposes.
Geolocation-OSINT
Geolocation-OSINT is a repository that provides a comprehensive list of resources, tools, and platforms for geolocation challenges and open-source intelligence. It includes a wide range of mapping services, image search tools, AI-powered geolocation estimators, and satellite imagery archives. The repository covers various aspects of geolocation, from finding GPS coordinates to estimating the size of objects in images. Users can access tools for social media monitoring, street-level imagery, and geospatial analysis. Geolocation-OSINT is a valuable resource for individuals interested in geolocation, mapping, and intelligence gathering.
FlipAttack
FlipAttack is a jailbreak attack tool designed to exploit black-box Language Model Models (LLMs) by manipulating text inputs. It leverages insights into LLMs' autoregressive nature to construct noise on the left side of the input text, deceiving the model and enabling harmful behaviors. The tool offers four flipping modes to guide LLMs in denoising and executing malicious prompts effectively. FlipAttack is characterized by its universality, stealthiness, and simplicity, allowing users to compromise black-box LLMs with just one query. Experimental results demonstrate its high success rates against various LLMs, including GPT-4o and guardrail models.
AgentPoison
AgentPoison is a repository that provides the official PyTorch implementation of the paper 'AgentPoison: Red-teaming LLM Agents via Memory or Knowledge Base Backdoor Poisoning'. It offers tools for red-teaming LLM agents by poisoning memory or knowledge bases. The repository includes trigger optimization algorithms, agent experiments, and evaluation scripts for Agent-Driver, ReAct-StrategyQA, and EHRAgent. Users can fine-tune motion planners, inject queries with triggers, and evaluate red-teaming performance. The codebase supports multiple RAG embedders and provides a unified dataset access for all three agents.
SinkFinder
SinkFinder + LLM is a closed-source semi-automatic vulnerability discovery tool that performs static code analysis on jar/war/zip files. It enhances the capability of LLM large models to verify path reachability and assess the trustworthiness score of the path based on the contextual code environment. Users can customize class and jar exclusions, depth of recursive search, and other parameters through command-line arguments. The tool generates rule.json configuration file after each run and requires configuration of the DASHSCOPE_API_KEY for LLM capabilities. The tool provides detailed logs on high-risk paths, LLM results, and other findings. Rules.json file contains sink rules for various vulnerability types with severity levels and corresponding sink methods.
65 - OpenAI Gpts
Detective Sherlock
Your AI Detective for piecing together puzzles and solving any mystery.
Crime and Mystery Solver
Expert in solving crimes and mysteries, adept at handling extensive data.
Cyber Test & CareerPrep
Helping you study for cybersecurity certifications and get the job you want!
Cyber Threat Intelligence
An automated cyber threat intelligence expert configured and trained by Bob Gourley. Pls provide feedback. Find Bob on X at @bobgourley
Prepper Survival Guide
... A Guide for Prepping and Survival Strategies ... Life is unpredictable, and while we often hope for the best ... prepare for the worst.
Cyber Audit and Pentest RFP Builder
Generates cybersecurity audit and penetration test specifications.
Blue Team Guide
it is a meticulously crafted arsenal of knowledge, insights, and guidelines that is shaped to empower organizations in crafting, enhancing, and refining their cybersecurity defenses
Cyber Guardian
I'm your personal cybersecurity advisor, here to help you stay safe online.
InfoSec Advisor
An expert in the technical, organizational, infrastructural and personnel aspects of information security management systems (ISMS)
CISO GPT
Specialized LLM in computer security, acting as a CISO with 20 years of experience, providing precise, data-driven technical responses to enhance organizational security.
👑 Data Privacy for PI & Security Firms 👑
Private Investigators and Security Firms, given the nature of their work, handle highly sensitive information and must maintain strict confidentiality and data privacy standards.
Website Security with Jim Walker | HackRepair.com
Jim Walker "The Hack Repair Guy" is a WordPress Security Expert. He Manages HackRepair.com and HackGuard.com, a Malware Cleanup and WordPress Management Service.
ethicallyHackingspace (eHs)® (Full Spectrum)™
Full Spectrum Space Cybersecurity Professional ™ AI-copilot (BETA)
The Sabotage Strategist
Playful strategist using humor and proximity to offer 'sabotage' tactics from a 1944 OSS Manual.
Mónica
CSIRT que lidera un equipo especializado en detectar y responder a incidentes de seguridad, maneja la contención y recuperación, organiza entrenamientos y simulacros, elabora reportes para optimizar estrategias de seguridad y coordina con entidades legales cuando es necesario
Java Security Expert
Java Security Expert offering advice on best practices and resolving security issues.
CyberNews GPT
CyberNews GPT is an assistant that provides the latest security news about cyber threats, hackings and breaches, malware, zero-day vulnerabilities, phishing, scams and so on.
Incident Response Forensic Techniques
help organizations in investigating computer security incidents and troubleshooting some information technology (IT) operational problems by providing practical guidance on performing computer and network forensics.
API Content Warehouse Leak Help
Comprehensive analysis of Google API Content Warehouse Leak
Detective
Dedicated investigator resolving diverse crimes, ensuring justice and community safety.
Aegis ⛨
Interactive Cybersecurity Tutor capable of autonomous management of your knowledge.
Sikich CMMC Coach
CMMC Coach: Guiding through CMMC processes with tailored strategies, interactive training, and regulatory compliance. https://www.sikich.com/technology/contact-us/ 877.403.5227 | [email protected]