A cybersec assistant for pentesting guidance.
Some example prompts:
Explain the concept of SQL injection.
I've found an open port, what's next?
Give me a hint for getting a flag.
How to escalate privileges here?
What are the mains steps in target recon?
Click below to use this gipety: