Uses ChatGPT API, Bard API, and Llama2, Python-Nmap, DNS Recon, PCAP and JWT recon modules and uses the GPT3 model to create vulnerability reports based on Nmap scan data, and DNS scan information. It can also perform subdomain enumeration to a great extent
Hi
When I run program:
python gpt_vuln.py --target IP --attack dns
I get this error:
\AppData\Local\Programs\Python\Python311\Lib\site-packages\dns\resolver.py", line 691, in next_request
raise NXDOMAIN(qnames=self.qnames_to_try, responses=self.nxdomain_responses)
dns.resolver.NXDOMAIN: The DNS query name does not exist: IPAddress
hello iam trying to run the projet but iam encountering an error regarding the path of nmap in the system
i downloaded the software as well on the system and add the path for the nmap in the environment variables i would love for you to contact me please thanks !
Hello
Playing around with the project, after running nmap with OpenAI using profile 5 or 12 i come with the error:
"message: "This model's maximum context length is 16385 tokens, however you requested 17216 tokens (14716 in your prompt; 2500 for the completion). Please reduce your prompt; or completion length.","
I'm getting this message after changing the model from gpt-3.5-turbo-0613 to gpt-3.5-turbo-0125
What would be the best approach here?