CyberStrikeAI
CyberStrikeAI is an AI-native security testing platform built in Go. It integrates 100+ security tools, an intelligent orchestration engine, role-based testing with predefined security roles, a skills system with specialized testing skills, and comprehensive lifecycle management capabilities.
Stars: 782
CyberStrikeAI is an AI-native security testing platform built in Go that integrates 100+ security tools, an intelligent orchestration engine, role-based testing with predefined security roles, a skills system with specialized testing skills, and comprehensive lifecycle management capabilities. It enables end-to-end automation from conversational commands to vulnerability discovery, attack-chain analysis, knowledge retrieval, and result visualization, delivering an auditable, traceable, and collaborative testing environment for security teams. The platform features an AI decision engine with OpenAI-compatible models, native MCP implementation with various transports, prebuilt tool recipes, large-result pagination, attack-chain graph, password-protected web UI, knowledge base with vector search, vulnerability management, batch task management, role-based testing, and skills system.
README:
CyberStrikeAI is an AI-native security testing platform built in Go. It integrates 100+ security tools, an intelligent orchestration engine, role-based testing with predefined security roles, a skills system with specialized testing skills, and comprehensive lifecycle management capabilities. Through native MCP protocol and AI agents, it enables end-to-end automation from conversational commands to vulnerability discovery, attack-chain analysis, knowledge retrieval, and result visualizationβdelivering an auditable, traceable, and collaborative testing environment for security teams.
The dashboard provides a comprehensive overview of system runtime status, security vulnerabilities, tool usage, and knowledge base, helping users quickly understand the platform's core features and current state.
Web Console
|
Attack Chain Visualization
|
Task Management
|
Vulnerability Management
|
MCP Management
|
MCP stdio Mode
|
Knowledge Base
|
Skills Management
|
Role Management
|
- π€ AI decision engine with OpenAI-compatible models (GPT, Claude, DeepSeek, etc.)
- π Native MCP implementation with HTTP/stdio/SSE transports and external MCP federation
- π§° 100+ prebuilt tool recipes + YAML-based extension system
- π Large-result pagination, compression, and searchable archives
- π Attack-chain graph, risk scoring, and step-by-step replay
- π Password-protected web UI, audit logs, and SQLite persistence
- π Knowledge base with vector search and hybrid retrieval for security expertise
- π Conversation grouping with pinning, rename, and batch management
- π‘οΈ Vulnerability management with CRUD operations, severity tracking, status workflow, and statistics
- π Batch task management: create task queues, add multiple tasks, and execute them sequentially
- π Role-based testing: predefined security testing roles (Penetration Testing, CTF, Web App Scanning, etc.) with custom prompts and tool restrictions
- π― Skills system: 20+ predefined security testing skills (SQL injection, XSS, API security, etc.) that can be attached to roles or called on-demand by AI agents
CyberStrikeAI ships with 100+ curated tools covering the whole kill chain:
- Network Scanners β nmap, masscan, rustscan, arp-scan, nbtscan
- Web & App Scanners β sqlmap, nikto, dirb, gobuster, feroxbuster, ffuf, httpx
- Vulnerability Scanners β nuclei, wpscan, wafw00f, dalfox, xsser
- Subdomain Enumeration β subfinder, amass, findomain, dnsenum, fierce
- Network Space Search Engines β fofa_search, zoomeye_search
- API Security β graphql-scanner, arjun, api-fuzzer, api-schema-analyzer
- Container Security β trivy, clair, docker-bench-security, kube-bench, kube-hunter
- Cloud Security β prowler, scout-suite, cloudmapper, pacu, terrascan, checkov
- Binary Analysis β gdb, radare2, ghidra, objdump, strings, binwalk
- Exploitation β metasploit, msfvenom, pwntools, ropper, ropgadget
- Password Cracking β hashcat, john, hashpump
- Forensics β volatility, volatility3, foremost, steghide, exiftool
- Post-Exploitation β linpeas, winpeas, mimikatz, bloodhound, impacket, responder
- CTF Utilities β stegsolve, zsteg, hash-identifier, fcrackzip, pdfcrack, cyberchef
- System Helpers β exec, create-file, delete-file, list-files, modify-file
Prerequisites:
One-Command Deployment:
git clone https://github.com/Ed1s0nZ/CyberStrikeAI.git
cd CyberStrikeAI-main
chmod +x run.sh && ./run.shThe run.sh script will automatically:
- β Check and validate Go & Python environments
- β Create Python virtual environment
- β Install Python dependencies
- β Download Go dependencies
- β Build the project
- β Start the server
First-Time Configuration:
-
Configure OpenAI-compatible API (required before first use)
- Open http://localhost:8080 after launch
- Go to
Settingsβ Fill in your API credentials:openai: api_key: "sk-your-key" base_url: "https://api.openai.com/v1" # or https://api.deepseek.com/v1 model: "gpt-4o" # or deepseek-chat, claude-3-opus, etc.
- Or edit
config.yamldirectly before launching
-
Login - Use the auto-generated password shown in the console (or set
auth.passwordinconfig.yaml) -
Install security tools (optional) - Install tools as needed:
AI automatically falls back to alternatives when a tool is missing.
# macOS brew install nmap sqlmap nuclei httpx gobuster feroxbuster subfinder amass # Ubuntu/Debian sudo apt-get install nmap sqlmap nuclei httpx gobuster feroxbuster
Alternative Launch Methods:
# Direct Go run (requires manual setup)
go run cmd/server/main.go
# Manual build
go build -o cyberstrike-ai cmd/server/main.go
./cyberstrike-aiNote: The Python virtual environment (venv/) is automatically created and managed by run.sh. Tools that require Python (like api-fuzzer, http-framework-test, etc.) will automatically use this environment.
- Conversation testing β Natural-language prompts trigger toolchains with streaming SSE output.
- Role-based testing β Select from predefined security testing roles (Penetration Testing, CTF, Web App Scanning, API Security Testing, etc.) to customize AI behavior and tool availability. Each role applies custom system prompts and can restrict available tools for focused testing scenarios.
- Tool monitor β Inspect running jobs, execution logs, and large-result attachments.
- History & audit β Every conversation and tool invocation is stored in SQLite with replay.
- Conversation groups β Organize conversations into groups, pin important groups, rename or delete groups via context menu.
- Vulnerability management β Create, update, and track vulnerabilities discovered during testing. Filter by severity (critical/high/medium/low/info), status (open/confirmed/fixed/false_positive), and conversation. View statistics and export findings.
- Batch task management β Create task queues with multiple tasks, add or edit tasks before execution, and run them sequentially. Each task executes as a separate conversation, with status tracking (pending/running/completed/failed/cancelled) and full execution history.
- Settings β Tweak provider keys, MCP enablement, tool toggles, and agent iteration limits.
- Required-field validation prevents accidental blank API credentials.
- Auto-generated strong passwords when
auth.passwordis empty. - Unified auth middleware for every web/API call (Bearer token flow).
- Timeout and sandbox guards per tool, plus structured logging for triage.
-
Predefined roles β System includes 12+ predefined security testing roles (Penetration Testing, CTF, Web App Scanning, API Security Testing, Binary Analysis, Cloud Security Audit, etc.) in the
roles/directory. -
Custom prompts β Each role can define a
user_promptthat prepends to user messages, guiding the AI to adopt specialized testing methodologies and focus areas. -
Tool restrictions β Roles can specify a
toolslist to limit available tools, ensuring focused testing workflows (e.g., CTF role restricts to CTF-specific utilities). -
Skills integration β Roles can attach security testing skills. Skill names are added to system prompts as hints, and AI agents can access skill content on-demand using the
read_skilltool. -
Easy role creation β Create custom roles by adding YAML files to the
roles/directory. Each role definesname,description,user_prompt,icon,tools,skills, andenabledfields. - Web UI integration β Select roles from a dropdown in the chat interface. Role selection affects both AI behavior and available tool suggestions.
Creating a custom role (example):
- Create a YAML file in
roles/(e.g.,roles/custom-role.yaml):name: Custom Role description: Specialized testing scenario user_prompt: You are a specialized security tester focusing on API security... icon: "\U0001F4E1" tools: - api-fuzzer - arjun - graphql-scanner skills: - api-security-testing - sql-injection-testing enabled: true
- Restart the server or reload configuration; the role appears in the role selector dropdown.
-
Predefined skills β System includes 20+ predefined security testing skills (SQL injection, XSS, API security, cloud security, container security, etc.) in the
skills/directory. -
Skill hints in prompts β When a role is selected, skill names attached to that role are added to the system prompt as recommendations. Skill content is not automatically injected; AI agents must use the
read_skilltool to access skill details when needed. -
On-demand access β AI agents can also access skills on-demand using built-in tools (
list_skills,read_skill), allowing dynamic skill retrieval during task execution. -
Structured format β Each skill is a directory containing a
SKILL.mdfile with detailed testing methods, tool usage, best practices, and examples. Skills support YAML front matter for metadata. -
Custom skills β Create custom skills by adding directories to the
skills/directory. Each skill directory should contain aSKILL.mdfile with the skill content.
Creating a custom skill:
- Create a directory in
skills/(e.g.,skills/my-skill/) - Create a
SKILL.mdfile in that directory with the skill content - Attach the skill to a role by adding it to the role's
skillsfield in the role YAML file
-
YAML recipes in
tools/*.yamldescribe commands, arguments, prompts, and metadata. -
Directory hot-reload β pointing
security.tools_dirto a folder is usually enough; inline definitions inconfig.yamlremain supported for quick experiments. -
Large-result pagination β outputs beyond 200 KB are stored as artifacts retrievable through the
query_execution_resulttool with paging, filters, and regex search. - Result compression β multi-megabyte logs can be summarized or losslessly compressed before persisting to keep SQLite lean.
Creating a custom tool (typical flow)
- Copy an existing YAML file from
tools/(for exampletools/sample.yaml). - Update
name,command,args, andshort_description. - Describe positional or flag parameters in
parameters[]so the agent knows how to build CLI arguments. - Provide a longer
description/notesblock if the agent needs extra context or post-processing tips. - Restart the server or reload configuration; the new tool becomes available immediately and can be enabled/disabled from the Settings panel.
- AI parses each conversation to assemble targets, tools, vulnerabilities, and relationships.
- The web UI renders the chain as an interactive graph with severity scoring and step replay.
- Export the chain or raw findings to external reporting pipelines.
- Web mode β ships with HTTP MCP server automatically consumed by the UI.
-
MCP stdio mode β
go run cmd/mcp-stdio/main.goexposes the agent to Cursor/CLI. - External MCP federation β register third-party MCP servers (HTTP, stdio, or SSE) from the UI, toggle them per engagement, and monitor their health and call volume in real time.
-
Build the binary (run from the project root):
go build -o cyberstrike-ai-mcp cmd/mcp-stdio/main.go
-
Wire it up in Cursor
OpenSettings β Tools & MCP β Add Custom MCP, pick Command, then point to the compiled binary and your config:Replace the paths with your local locations; Cursor will launch the stdio server automatically.{ "mcpServers": { "cyberstrike-ai": { "command": "/absolute/path/to/cyberstrike-ai-mcp", "args": [ "--config", "/absolute/path/to/config.yaml" ] } } }
- Ensure
config.yamlhasmcp.enabled: trueand adjustmcp.host/mcp.portif you need a non-default binding (localhost:8081 works well for local Cursor usage). - Start the main service (
./run.shorgo run cmd/server/main.go); the MCP endpoint lives athttp://<host>:<port>/mcp. - In Cursor, choose Add Custom MCP β HTTP and set
Base URLtohttp://127.0.0.1:8081/mcp. - Prefer committing the setup via
.cursor/mcp.jsonso teammates can reuse it:{ "mcpServers": { "cyberstrike-ai-http": { "transport": "http", "url": "http://127.0.0.1:8081/mcp" } } }
CyberStrikeAI supports connecting to external MCP servers via three transport modes:
- HTTP mode β traditional request/response over HTTP POST
- stdio mode β process-based communication via standard input/output
- SSE mode β Server-Sent Events for real-time streaming communication
To add an external MCP server:
-
Open the Web UI and navigate to Settings β External MCP.
-
Click Add External MCP and provide the configuration in JSON format:
HTTP mode example:
{ "my-http-mcp": { "transport": "http", "url": "http://127.0.0.1:8081/mcp", "description": "HTTP MCP server", "timeout": 30 } }stdio mode example:
{ "my-stdio-mcp": { "command": "python3", "args": ["/path/to/mcp-server.py"], "description": "stdio MCP server", "timeout": 30 } }SSE mode example:
{ "my-sse-mcp": { "transport": "sse", "url": "http://127.0.0.1:8082/sse", "description": "SSE MCP server", "timeout": 30 } } -
Click Save and then Start to connect to the server.
-
Monitor the connection status, tool count, and health in real time.
SSE mode benefits:
- Real-time bidirectional communication via Server-Sent Events
- Suitable for scenarios requiring continuous data streaming
- Lower latency for push-based notifications
A test SSE MCP server is available at cmd/test-sse-mcp-server/ for validation purposes.
-
Vector search β AI agent can automatically search the knowledge base for relevant security knowledge during conversations using the
search_knowledge_basetool. - Hybrid retrieval β combines vector similarity search with keyword matching for better accuracy.
-
Auto-indexing β scans the
knowledge_base/directory for Markdown files and automatically indexes them with embeddings. - Web management β create, update, delete knowledge items through the web UI, with category-based organization.
- Retrieval logs β tracks all knowledge retrieval operations for audit and debugging.
Quick Start (Using Pre-built Knowledge Base):
- Download the knowledge database β Download the pre-built knowledge database file from GitHub Releases.
-
Extract and place β Extract the downloaded knowledge database file (
knowledge.db) and place it in the project'sdata/directory. - Restart the service β Restart the CyberStrikeAI service, and the knowledge base will be ready to use immediately without rebuilding the index.
Setting up the knowledge base:
-
Enable in config β set
knowledge.enabled: trueinconfig.yaml:knowledge: enabled: true base_path: knowledge_base embedding: provider: openai model: text-embedding-v4 base_url: "https://api.openai.com/v1" # or your embedding API api_key: "sk-xxx" retrieval: top_k: 5 similarity_threshold: 0.7 hybrid_weight: 0.7
-
Add knowledge files β place Markdown files in
knowledge_base/directory, organized by category (e.g.,knowledge_base/SQL Injection/README.md). - Scan and index β use the web UI to scan the knowledge base directory, which will automatically import files and build vector embeddings.
-
Use in conversations β the AI agent will automatically use
search_knowledge_basewhen it needs security knowledge. You can also explicitly ask: "Search the knowledge base for SQL injection techniques".
Knowledge base structure:
- Files are organized by category (directory name becomes the category).
- Each Markdown file becomes a knowledge item with automatic chunking for vector search.
- The system supports incremental updates β modified files are re-indexed automatically.
- REST APIs β everything the UI uses (auth, conversations, tool runs, monitor, vulnerabilities, roles) is available over JSON.
-
Role APIs β manage security testing roles via
/api/rolesendpoints:GET /api/roles(list all roles),GET /api/roles/:name(get role),POST /api/roles(create role),PUT /api/roles/:name(update role),DELETE /api/roles/:name(delete role). Roles are stored as YAML files in theroles/directory and support hot-reload. -
Vulnerability APIs β manage vulnerabilities via
/api/vulnerabilitiesendpoints:GET /api/vulnerabilities(list with filters),POST /api/vulnerabilities(create),GET /api/vulnerabilities/:id(get),PUT /api/vulnerabilities/:id(update),DELETE /api/vulnerabilities/:id(delete),GET /api/vulnerabilities/stats(statistics). -
Batch Task APIs β manage batch task queues via
/api/batch-tasksendpoints:POST /api/batch-tasks(create queue),GET /api/batch-tasks(list queues),GET /api/batch-tasks/:queueId(get queue),POST /api/batch-tasks/:queueId/start(start execution),POST /api/batch-tasks/:queueId/cancel(cancel),DELETE /api/batch-tasks/:queueId(delete),POST /api/batch-tasks/:queueId/tasks(add task),PUT /api/batch-tasks/:queueId/tasks/:taskId(update task),DELETE /api/batch-tasks/:queueId/tasks/:taskId(delete task). Tasks execute sequentially, each creating a separate conversation with full status tracking. - Task control β pause/resume/stop long scans, re-run steps with new params, or stream transcripts.
-
Audit & security β rotate passwords via
/api/auth/change-password, enforce short-lived sessions, and restrict MCP ports at the network layer when exposing the service.
auth:
password: "change-me"
session_duration_hours: 12
server:
host: "0.0.0.0"
port: 8080
log:
level: "info"
output: "stdout"
mcp:
enabled: true
host: "0.0.0.0"
port: 8081
openai:
api_key: "sk-xxx"
base_url: "https://api.deepseek.com/v1"
model: "deepseek-chat"
database:
path: "data/conversations.db"
knowledge_db_path: "data/knowledge.db" # Optional: separate DB for knowledge base
security:
tools_dir: "tools"
knowledge:
enabled: false # Enable knowledge base feature
base_path: "knowledge_base" # Path to knowledge base directory
embedding:
provider: "openai" # Embedding provider (currently only "openai")
model: "text-embedding-v4" # Embedding model name
base_url: "" # Leave empty to use OpenAI base_url
api_key: "" # Leave empty to use OpenAI api_key
retrieval:
top_k: 5 # Number of top results to return
similarity_threshold: 0.7 # Minimum similarity score (0-1)
hybrid_weight: 0.7 # Weight for vector search (1.0 = pure vector, 0.0 = pure keyword)
roles_dir: "roles" # Role configuration directory (relative to config file)
skills_dir: "skills" # Skills directory (relative to config file)name: "nmap"
command: "nmap"
args: ["-sT", "-sV", "-sC"]
enabled: true
short_description: "Network mapping & service fingerprinting"
parameters:
- name: "target"
type: "string"
description: "IP or domain"
required: true
position: 0
- name: "ports"
type: "string"
flag: "-p"
description: "Range, e.g. 1-1000"name: Penetration Testing
description: Professional penetration testing expert for comprehensive security testing
user_prompt: You are a professional cybersecurity penetration testing expert. Please use professional penetration testing methods and tools to conduct comprehensive security testing on targets, including but not limited to SQL injection, XSS, CSRF, file inclusion, command execution and other common vulnerabilities.
icon: "\U0001F3AF"
tools:
- nmap
- sqlmap
- nuclei
- burpsuite
- metasploit
- httpx
- record_vulnerability
- list_knowledge_risk_types
- search_knowledge_base
enabled: trueCyberStrikeAI/
βββ cmd/ # Server, MCP stdio entrypoints, tooling
βββ internal/ # Agent, MCP core, handlers, security executor
βββ web/ # Static SPA + templates
βββ tools/ # YAML tool recipes (100+ examples provided)
βββ roles/ # Role configurations (12+ predefined security testing roles)
βββ skills/ # Skills directory (20+ predefined security testing skills)
βββ images/ # Docs screenshots & diagrams
βββ config.yaml # Runtime configuration
βββ run.sh # Convenience launcher
βββ README*.md
Scan open ports on 192.168.1.1
Perform a comprehensive port scan on 192.168.1.1 focusing on 80,443,22
Check if https://example.com/page?id=1 is vulnerable to SQL injection
Scan https://example.com for hidden directories and outdated software
Enumerate subdomains for example.com, then run nuclei against the results
Load the recon-engagement template, run amass/subfinder, then brute-force dirs on every live host.
Use external Burp-based MCP server for authenticated traffic replay, then pass findings back for graphing.
Compress the 5 MB nuclei report, summarize critical CVEs, and attach the artifact to the conversation.
Build an attack chain for the latest engagement and export the node list with severity >= high.
- 2026-01-27 β OpenAPI documentation with interactive testing interface, supporting conversation management, message interaction, and result querying
- 2026-01-15 β Skills system with 20+ predefined security testing skills
- 2026-01-11 β Role-based testing with predefined security testing roles
- 2026-01-08 β SSE transport mode support for external MCP servers
- 2026-01-01 β Batch task management with queue-based execution
- 2025-12-25 β Vulnerability management and conversation grouping features
- 2025-12-20 β Knowledge base with vector search and hybrid retrieval
CyberStrikeAI has joined 404Starlink
Need help or want to contribute? Open an issue or PRβcommunity tooling additions are welcome!
For Tasks:
Click tags to check more tools for each tasksFor Jobs:
Alternative AI tools for CyberStrikeAI
Similar Open Source Tools
For similar tasks
CyberStrikeAI
CyberStrikeAI is an AI-native security testing platform built in Go that integrates 100+ security tools, an intelligent orchestration engine, role-based testing with predefined security roles, a skills system with specialized testing skills, and comprehensive lifecycle management capabilities. It enables end-to-end automation from conversational commands to vulnerability discovery, attack-chain analysis, knowledge retrieval, and result visualization, delivering an auditable, traceable, and collaborative testing environment for security teams. The platform features an AI decision engine with OpenAI-compatible models, native MCP implementation with various transports, prebuilt tool recipes, large-result pagination, attack-chain graph, password-protected web UI, knowledge base with vector search, vulnerability management, batch task management, role-based testing, and skills system.
h4cker
This repository is a comprehensive collection of cybersecurity-related references, scripts, tools, code, and other resources. It is carefully curated and maintained by Omar Santos. The repository serves as a supplemental material provider to several books, video courses, and live training created by Omar Santos. It encompasses over 10,000 references that are instrumental for both offensive and defensive security professionals in honing their skills.
CyberSentinel-AI
CyberSentinel AI is a powerful automated security monitoring and AI analysis system designed to help security researchers and enthusiasts track the latest security vulnerabilities (CVE) and security-related repositories on GitHub in real-time. It utilizes artificial intelligence technology for in-depth analysis and automatically publishes valuable security intelligence to a blogging platform. The system features multiple data sources monitoring, intelligent AI analysis using OpenAI and Gemini engines, fully automated workflow with 24/7 monitoring, daily briefings, and dynamic blacklists, flexible configuration and management with support for multiple tokens, configurable parameters, and detailed logging, and automatic blog publishing with integrated blogging platform and Markdown reports.
For similar jobs
hackingBuddyGPT
hackingBuddyGPT is a framework for testing LLM-based agents for security testing. It aims to create common ground truth by creating common security testbeds and benchmarks, evaluating multiple LLMs and techniques against those, and publishing prototypes and findings as open-source/open-access reports. The initial focus is on evaluating the efficiency of LLMs for Linux privilege escalation attacks, but the framework is being expanded to evaluate the use of LLMs for web penetration-testing and web API testing. hackingBuddyGPT is released as open-source to level the playing field for blue teams against APTs that have access to more sophisticated resources.
aio-proxy
This script automates setting up TUIC, hysteria and other proxy-related tools in Linux. It features setting domains, getting SSL certification, setting up a simple web page, SmartSNI by Bepass, Chisel Tunnel, Hysteria V2, Tuic, Hiddify Reality Scanner, SSH, Telegram Proxy, Reverse TLS Tunnel, different panels, installing, disabling, and enabling Warp, Sing Box 4-in-1 script, showing ports in use and their corresponding processes, and an Android script to use Chisel tunnel.
aircrackauto
AirCrackAuto is a tool that automates the aircrack-ng process for Wi-Fi hacking. It is designed to make it easier for users to crack Wi-Fi passwords by automating the process of capturing packets, generating wordlists, and launching attacks. AirCrackAuto is a powerful tool that can be used to crack Wi-Fi passwords in a matter of minutes.
awesome-gpt-security
Awesome GPT + Security is a curated list of awesome security tools, experimental case or other interesting things with LLM or GPT. It includes tools for integrated security, auditing, reconnaissance, offensive security, detecting security issues, preventing security breaches, social engineering, reverse engineering, investigating security incidents, fixing security vulnerabilities, assessing security posture, and more. The list also includes experimental cases, academic research, blogs, and fun projects related to GPT security. Additionally, it provides resources on GPT security standards, bypassing security policies, bug bounty programs, cracking GPT APIs, and plugin security.
h4cker
This repository is a comprehensive collection of cybersecurity-related references, scripts, tools, code, and other resources. It is carefully curated and maintained by Omar Santos. The repository serves as a supplemental material provider to several books, video courses, and live training created by Omar Santos. It encompasses over 10,000 references that are instrumental for both offensive and defensive security professionals in honing their skills.
aircrack-ng
Aircrack-ng is a comprehensive suite of tools designed to evaluate the security of WiFi networks. It covers various aspects of WiFi security, including monitoring, attacking (replay attacks, deauthentication, fake access points), testing WiFi cards and driver capabilities, and cracking WEP and WPA PSK. The tools are command line-based, allowing for extensive scripting and have been utilized by many GUIs. Aircrack-ng primarily works on Linux but also supports Windows, macOS, FreeBSD, OpenBSD, NetBSD, Solaris, and eComStation 2.
ai-exploits
AI Exploits is a repository that showcases practical attacks against AI/Machine Learning infrastructure, aiming to raise awareness about vulnerabilities in the AI/ML ecosystem. It contains exploits and scanning templates for responsibly disclosed vulnerabilities affecting machine learning tools, including Metasploit modules, Nuclei templates, and CSRF templates. Users can use the provided Docker image to easily run the modules and templates. The repository also provides guidelines for using Metasploit modules, Nuclei templates, and CSRF templates to exploit vulnerabilities in machine learning tools.
airgeddon
Airgeddon is a versatile bash script designed for Linux systems to conduct wireless network audits. It provides a comprehensive set of features and tools for auditing and securing wireless networks. The script is user-friendly and offers functionalities such as scanning, capturing handshakes, deauth attacks, and more. Airgeddon is regularly updated and supported, making it a valuable tool for both security professionals and enthusiasts.










