ai-powered-pentesting
Compare original and translation side by side
🇺🇸
Original
English🇨🇳
Translation
ChineseAI-Powered Pentesting & Red Teaming
AI驱动的渗透测试与红队行动
Scope
适用范围
Use this skill when working on:
- AI/LLM-powered penetration testing tools
- Autonomous security agents
- AI red teaming frameworks
- MCP (Model Context Protocol) security tools
- AI-assisted vulnerability discovery
当你开展以下工作时可使用本指南:
- AI/LLM驱动的渗透测试工具
- 自主安全Agent
- AI红队框架
- MCP(模型上下文协议)安全工具
- AI辅助漏洞发现
AI Pentesting Tool Categories
AI渗透测试工具分类
LLM-Powered Pentesting Agents
LLM驱动的渗透测试Agent
- PentestGPT - GPT-4 powered pentesting
- HackingBuddyGPT - Autonomous red teaming
- AI-OPS - AI assistant for pentesting
- BugTrace-AI - Automated web pentesting
- PentestGPT - 基于GPT-4的渗透测试工具
- HackingBuddyGPT - 自主红队行动工具
- AI-OPS - 面向渗透测试的AI助手
- BugTrace-AI - 自动化Web渗透测试工具
AI Red Teaming Frameworks
AI红队框架
- Counterfit (Microsoft) - ML model attacks
- PyRIT (Microsoft) - GenAI red teaming
- PurpleLlama (Meta) - LLM safety tools
- Garak (NVIDIA) - LLM vulnerability scanner
- Counterfit(微软) - ML模型攻击工具
- PyRIT(微软) - 生成式AI红队测试工具
- PurpleLlama(Meta) - LLM安全工具
- Garak(NVIDIA) - LLM漏洞扫描器
AI Security MCP Tools
AI安全MCP工具
- HexStrike AI - 150+ cybersecurity tools via MCP
- MCP Safety Scanner - MCP security testing
- Pentest MCP - Pentesting via MCP
- HexStrike AI - 通过MCP提供150+款网络安全工具
- MCP Safety Scanner - MCP安全测试工具
- Pentest MCP - 基于MCP的渗透测试工具
AI-Assisted Analysis
AI辅助分析
- GhidraGPT - GPT for reverse engineering
- GhidrAssist - LLM extension for Ghidra
- WinDbg Copilot - AI debugging extension
- BurpGPT - AI vulnerability scanning
- GhidraGPT - 面向逆向工程的GPT工具
- GhidrAssist - Ghidra的LLM扩展插件
- WinDbg Copilot - AI调试扩展
- BurpGPT - AI漏洞扫描工具
Use Cases
用例
Offensive
攻击侧
- Automated reconnaissance with AI analysis
- AI-powered vulnerability discovery
- Autonomous exploitation attempts
- Social engineering with LLMs
- AI password cracking
- 结合AI分析的自动化侦察
- AI驱动的漏洞发现
- 自主漏洞利用尝试
- 基于LLM的社会工程学攻击
- AI密码破解
Defensive
防御侧
- AI-powered threat detection
- Automated security scanning
- Intelligent log analysis
- AI-assisted incident response
- AI驱动的威胁检测
- 自动化安全扫描
- 智能日志分析
- AI辅助事件响应
Where to Add Links in README
README链接添加位置
- AI pentesting tools:
AI Pentesting & Red Teaming → AI-Powered Pentesting - Red teaming frameworks:
AI Pentesting & Red Teaming → AI Red Teaming Tools - MCP security tools:
AI Pentesting & Red Teaming → AI Security MCP Tools - AI RE/debugging tools:
AI Security Tools & Frameworks → AI Reverse Engineering - AI vulnerability scanners:
AI Security Tools & Frameworks → AI Vulnerability Detection - AI CVE analysis:
AI Security Tools & Frameworks → AI CVE Analysis
- AI渗透测试工具:
AI Pentesting & Red Teaming → AI-Powered Pentesting - 红队框架:
AI Pentesting & Red Teaming → AI Red Teaming Tools - MCP安全工具:
AI Pentesting & Red Teaming → AI Security MCP Tools - AI逆向工程/调试工具:
AI Security Tools & Frameworks → AI Reverse Engineering - AI漏洞扫描器:
AI Security Tools & Frameworks → AI Vulnerability Detection - AI CVE分析:
AI Security Tools & Frameworks → AI CVE Analysis
Quality Bar
质量标准
- Tool must use AI/ML (not just automation)
- Prefer tools with active maintenance
- Include only canonical repos
- 工具必须使用AI/ML技术(不只是普通自动化工具)
- 优先选择仍在活跃维护的工具
- 仅收录官方规范仓库
Notes
注意事项
Keep additions:
- AI-powered (not traditional tools)
- Non-duplicated URLs
- Minimal structural changes
新增内容需满足:
- 由AI驱动(非传统工具)
- URL无重复
- 尽量减少结构改动
Data Source
数据来源
For detailed and up-to-date resources, fetch the complete list from:
https://raw.githubusercontent.com/gmh5225/awesome-ai-security/refs/heads/main/README.mdUse this URL to get the latest curated links when you need specific tools, papers, or resources not covered in this skill.
如需获取详细的最新资源,可从以下地址获取完整列表:
https://raw.githubusercontent.com/gmh5225/awesome-ai-security/refs/heads/main/README.md如果需要本指南未涵盖的特定工具、论文或资源,可通过该URL获取最新的精选链接。