A modular framework for benchmarking LLMs and agentic strategies on security challenges across HackTheBox, TryHackMe, PortSwigger Labs, Cybench, picoCTF and more.
☆230Feb 27, 2026Updated last week
Alternatives and similar repositories for BoxPwnr
Users that are interested in BoxPwnr are comparing it to the libraries listed below
Sorting:
- Configurable, Community driven, HTTP C2 Profile☆27Feb 16, 2026Updated 2 weeks ago
- results of scraping OneDrive from February 2022 - March 2025☆27Apr 29, 2025Updated 10 months ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55May 7, 2025Updated 10 months ago
- ☆11Dec 9, 2025Updated 2 months ago
- Dummy services for an A/D CTF☆10May 25, 2023Updated 2 years ago
- Caddy v2 module to filter requests based on C2 profiles☆46Apr 24, 2025Updated 10 months ago
- MIPS VM to execute payloads without allocating executable memory. Based on a PlayStation 1 (PSX) Emulator.☆125Dec 6, 2024Updated last year
- Easily write tests and fuzz many different programs.☆12Dec 13, 2022Updated 3 years ago
- ☆10May 25, 2023Updated 2 years ago
- OID-See is an identity attack surface mapping tool that models OAuth trust, persistence, and impersonation paths in Entra using a graph-b…☆31Jan 19, 2026Updated last month
- Make inso available in your GitHub Actions workflows☆11Jul 16, 2025Updated 7 months ago
- ☆68Jan 1, 2026Updated 2 months ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆92Jan 14, 2026Updated last month
- ☆121Jan 7, 2026Updated last month
- This repository contains various shell scripts and tips and tricks used for packaging androidtamer packages☆13Jul 10, 2022Updated 3 years ago
- ☆20Apr 10, 2025Updated 10 months ago
- Generatore di rumore scimmiesco in contesto di gare A/D☆11Jul 7, 2023Updated 2 years ago
- Demo of using WASM to sandbox Plotly execution☆19Mar 30, 2025Updated 11 months ago
- Ruby library for interacting with Bugcrowd's VRT☆14Updated this week
- A bash tool used to install famous bug bounty tools. Mainly used when setting up a fresh environment.☆16Mar 20, 2023Updated 2 years ago
- An AI-driven MCP server that autonomously interfaces with Malware Bazaar, delivering real-time threat intel and sample metadata for autho…☆26Nov 26, 2025Updated 3 months ago
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- ☆11May 19, 2017Updated 8 years ago
- A tool to encode and decode content as whitespace☆18Sep 24, 2023Updated 2 years ago
- A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.☆13Sep 23, 2017Updated 8 years ago
- Golang bindings for PE-sieve☆42Nov 11, 2023Updated 2 years ago
- Micro-agent framework for Caido☆29Sep 4, 2025Updated 6 months ago
- Example agents for the Dreadnode platform☆24Dec 19, 2025Updated 2 months ago
- Given a list of domains and known IP and buckets that are owned, which might be susceptible to domain hijacking?☆15Sep 20, 2024Updated last year
- 🐐 Intrusion Detection System☆17Jan 10, 2023Updated 3 years ago
- Keyhack - Golang API token/webhook validator☆16Mar 20, 2025Updated 11 months ago
- Advanced SQLMap command builder with an intuitive cheatsheet UI. Works locally in your browser as a single HTML file (no data sent anywhe…☆32Jul 6, 2025Updated 8 months ago
- Tool for assessing on-premises Microsoft servers authentication such as ADFS, Skype, Exchange, and RDWeb☆148Dec 3, 2020Updated 5 years ago
- Jeopardy challenges for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆42Oct 24, 2024Updated last year
- For the analysis of CVE-2013-2028☆30Jun 7, 2018Updated 7 years ago
- A CLI tool for leveraging IDP signing keys to impersonate users and groups☆19Apr 1, 2021Updated 4 years ago
- A python package that helps with analysis of MSI files☆14Mar 28, 2021Updated 4 years ago
- Frontend for MalShare.com☆17Feb 15, 2026Updated 2 weeks ago
- Ansible role that Installs Mythic☆19Jun 24, 2024Updated last year