GyoiThon

Penetration test tool

An Intelligence Gathering tool for Web Servers using Machine Learning and Custom Search APIs.

GyoiThon is a growing penetration test tool using Machine Learning.

GitHub

751 stars
66 watching
285 forks
Language: Python
last commit: over 1 year ago
Linked from 1 awesome list


Backlinks from these awesome lists:

Related projects:

Repository Description Stars
yakuza8/peniot A penetration testing tool for IoT devices, allowing users to simulate security attacks on target devices. 211
inguardians/peirates Automates known techniques to steal and collect sensitive data from Kubernetes clusters 1,253
jhwohlgemuth/zsh-pentest A plugin for the oh-my-zsh shell that provides a set of aliases and functions for performing penetration testing tasks. 64
yyzpiero/rl4redteam An agent trained to scan for vulnerabilities and exploit them in a simulated network environment 23
ehrishirajsharma/swiftnessx A cross-platform note-taking and target-tracking app designed to support penetration testers in bug bounty activities. 892
lgcarmo/wpexploitation A tool designed to facilitate the collection of information on Windows systems during a penetration test 0
akamai-threat-research/mqtt-pwn A tool for penetration testing and security assessment of MQTT brokers using various exploitation techniques. 370
govtech-csg/autowasp A tool to automate web security testing and logging using Burp Suite 75
cchio/deep-pwning A tool to test the vulnerability of machine learning models to adversarial attacks 562
samsung/cotopaxi A collection of Python tools for testing the security of Internet of Things devices and protocols 353
vysecurity/aggressor-vysec A collection of scripts designed to facilitate penetration testing and threat simulation by providing tools for reconnaissance, environment setup, and network exploitation. 207
jaromiru/nasimemu A framework for training reinforcement learning agents to generalize in novel penetration-testing scenarios 33
jzadeh/aktaion A lightweight tool for detecting exploits and generating policies based on micro behaviors of malicious activities 142