GyoiThon
Penetration test tool
An Intelligence Gathering tool for Web Servers using Machine Learning and Custom Search APIs.
GyoiThon is a growing penetration test tool using Machine Learning.
744 stars
66 watching
285 forks
Language: Python
last commit: over 1 year ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
yakuza8/peniot | A penetration testing tool for IoT devices, allowing users to simulate security attacks on target devices. | 209 |
inguardians/peirates | Automates penetration testing of Kubernetes clusters by exploiting known vulnerabilities and gaining unauthorized access. | 1,242 |
pwnieexpress/raspberry_pwn | A comprehensive pentesting suite built on Raspberry Pi, designed to aid in the exploration and exploitation of vulnerable systems | 1,029 |
jhwohlgemuth/zsh-pentest | A plugin for the oh-my-zsh shell that provides a set of aliases and functions for performing penetration testing tasks. | 63 |
yyzpiero/rl4redteam | An agent trained to scan for vulnerabilities and exploit them in a simulated network environment | 22 |
ehrishirajsharma/swiftnessx | A cross-platform note-taking and target-tracking app designed to support penetration testers in bug bounty activities. | 889 |
lgcarmo/wpexploitation | A tool designed to facilitate the collection of information on Windows systems during a penetration test | 0 |
akamai-threat-research/mqtt-pwn | A tool for penetration testing and security assessment of MQTT brokers using various exploitation techniques. | 369 |
govtech-csg/autowasp | A tool to automate web security testing and logging using Burp Suite | 74 |
cchio/deep-pwning | A tool to test the vulnerability of machine learning models to adversarial attacks | 559 |
samsung/cotopaxi | A collection of Python tools for testing the security of Internet of Things devices and protocols | 351 |
vysecurity/aggressor-vysec | A collection of scripts designed to facilitate penetration testing and threat simulation by providing tools for reconnaissance, environment setup, and network exploitation. | 207 |
jaromiru/nasimemu | A framework for training reinforcement learning agents to generalize in novel penetration-testing scenarios | 33 |
jzadeh/aktaion | A lightweight tool for detecting exploits and generating policies based on micro behaviors of malicious activities | 142 |