mazen160/shennina

Automating Host Exploitation with AI

41
/ 100
Emerging

This tool helps cybersecurity professionals automate the process of finding and exploiting vulnerabilities in network systems. It takes in a list of target machines and automatically scans for services, identifies potential exploits using AI, attempts attacks, and can exfiltrate data from compromised machines. Security testers and penetration testers would use this to streamline their reconnaissance and exploitation workflows.

548 stars. No commits in the last 6 months.

Use this if you are a penetration tester or security researcher looking to automate the scanning, vulnerability analysis, and exploitation phases of your ethical hacking engagements.

Not ideal if you need a tool for general network scanning or basic vulnerability assessment without automated exploitation capabilities.

penetration-testing vulnerability-management ethical-hacking red-teaming cybersecurity-automation
No License Stale 6m No Package No Dependents
Maintenance 0 / 25
Adoption 10 / 25
Maturity 8 / 25
Community 23 / 25

How are scores calculated?

Stars

548

Forks

103

Language

Python

License

Last pushed

Nov 08, 2022

Commits (30d)

0

Get this data via API

curl "https://pt-edge.onrender.com/api/v1/quality/ml-frameworks/mazen160/shennina"

Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.