This is an AI-research project that focus on developing AI-generated cybersecurity tools
This project focuses on defensive action.
This is an AI-research project that focus on developing AI-generated cybersecurity tools
This project focuses on defensive action.
Scans Hierarchical Deterministic (HD) wallets (e.g., Bitcoin, Ethereum) for weak or compromised seed
Python 2
Compares the current configuration against a known good baseline (e.g., from a golden image or appro
Python 2
Calculates and displays the entropy of a file, highlighting potentially compressed or encrypted data
Python 1
Lookup ASN (Autonomous System Number) information for a given IP address or hostname using public da
Python 1
Analyzes HTML forms to determine if anti-CSRF tokens are present and correctly implemented, identify
Randomly renames, reorders, and changes the data types of columns in a dataset to obfuscate its stru
Generates a baseline of permission usage patterns to feed into anomaly detection systems, focusing o
A command-line tool that takes a list of vulnerability IDs or security event logs and aggregates rel
Analyzes smart contracts for unreachable or redundant code, highlighting potential vulnerabilities a
Simplifies complex relationships between datasets by identifying and removing redundant or non-essen
Replaces characters in sensitive data (like usernames or URLs) with visually similar homoglyphs to o
Scans Docker images for known vulnerabilities using `grype` or `trivy` command-line tools. Presents
Detects configurations that enable services which are currently inactive or not being used, suggesti
Fuzzes API endpoints with various payloads (including SQL injection, command injection, and XSS) to
Loading…
Loading…