Difference between revisions of "Cyber Security: AI"
Jump to navigation
Jump to search
Onnowpurbo (talk | contribs) |
Onnowpurbo (talk | contribs) |
||
| (5 intermediate revisions by the same user not shown) | |||
| Line 2: | Line 2: | ||
| + | |||
| + | ==Referensi== | ||
| + | |||
| + | * https://github.com/0x4m4/hexstrike-ai | ||
| + | * https://www.perplexity.ai/hub/blog/introducing-comet | ||
==Pranala Menarik== | ==Pranala Menarik== | ||
| Line 8: | Line 13: | ||
* [[Cyber Security: ollama-assisted pentest]] | * [[Cyber Security: ollama-assisted pentest]] | ||
* [[Cyber Security: ollama-assisted SQLmap]] | * [[Cyber Security: ollama-assisted SQLmap]] | ||
| + | * [[Cyber Security: ollama-assisted Nmap]] | ||
| + | * [[Cyber Security: ollama-assisted Nmap auto-exploit suggestion]] | ||
| + | * [[Cyber Security: target SQL Injection Sederhana]] | ||
| + | * [[Cyber Security: target SQL Injection ke id serderhana]] | ||
Latest revision as of 20:18, 15 September 2025
Referensi
Pranala Menarik
- Cyber Security: AI based
- Cyber Security: ollama-assisted pentest
- Cyber Security: ollama-assisted SQLmap
- Cyber Security: ollama-assisted Nmap
- Cyber Security: ollama-assisted Nmap auto-exploit suggestion
- Cyber Security: target SQL Injection Sederhana
- Cyber Security: target SQL Injection ke id serderhana