Difference between revisions of "Cyber Security: AI"
Jump to navigation
Jump to search
Onnowpurbo (talk | contribs) |
Onnowpurbo (talk | contribs) |
||
(2 intermediate revisions by the same user not shown) | |||
Line 2: | Line 2: | ||
+ | |||
+ | ==Referensi== | ||
+ | |||
+ | * https://github.com/0x4m4/hexstrike-ai | ||
+ | * https://www.perplexity.ai/hub/blog/introducing-comet | ||
==Pranala Menarik== | ==Pranala Menarik== | ||
Line 11: | Line 16: | ||
* [[Cyber Security: ollama-assisted Nmap auto-exploit suggestion]] | * [[Cyber Security: ollama-assisted Nmap auto-exploit suggestion]] | ||
* [[Cyber Security: target SQL Injection Sederhana]] | * [[Cyber Security: target SQL Injection Sederhana]] | ||
+ | * [[Cyber Security: target SQL Injection ke id serderhana]] |
Latest revision as of 20:18, 15 September 2025
Referensi
Pranala Menarik
- Cyber Security: AI based
- Cyber Security: ollama-assisted pentest
- Cyber Security: ollama-assisted SQLmap
- Cyber Security: ollama-assisted Nmap
- Cyber Security: ollama-assisted Nmap auto-exploit suggestion
- Cyber Security: target SQL Injection Sederhana
- Cyber Security: target SQL Injection ke id serderhana