An advanced AI-driven vulnerability scanner and penetration testing tool that integrates multiple AI providers (OpenAI, Grok, OLLAMA, Claude) with comprehensive security testing modules for automated bug hunting, intelligent payload generation, and professional reporting.
☆35Nov 7, 2025Updated 5 months ago
Alternatives and similar repositories for AI-driven-penetration-testing-tool
Users that are interested in AI-driven-penetration-testing-tool are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Nov 1, 2022Updated 3 years ago
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆29Jun 13, 2025Updated 10 months ago
- Phishing Email Detection Using Machine Learning This repository contains a comprehensive project aimed at detecting phishing emails usi…☆31Jan 9, 2026Updated 3 months ago
- Data Communication and Computer Networks Project on smart home automation with Cisco Packet Tracer☆25Dec 20, 2020Updated 5 years ago
- Covert.io blog☆12Feb 3, 2024Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- SBOM-TOOL is a ctl tool that generates software bill of materials (SBOM) for software projects through source code warehouse, code finger…☆13Oct 11, 2025Updated 6 months ago
- A fun way to express your feelings if you are a programmer☆10Oct 25, 2022Updated 3 years ago
- A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-…☆24Jan 17, 2026Updated 2 months ago
- Centralized docs of ProjectDiscovery☆24Apr 7, 2026Updated last week
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Dec 11, 2023Updated 2 years ago
- ☆12Feb 20, 2025Updated last year
- n8n workflows related to bug bounty☆48Oct 27, 2025Updated 5 months ago
- Based on ossiozac/Raspberry-Pi-Zero-Rubber-Ducky-Duckberry-Pi☆12Oct 27, 2020Updated 5 years ago
- Uber simulation app with Firebase and real-time location on both devices.☆10Jan 23, 2024Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- terminal customization☆10Dec 17, 2022Updated 3 years ago
- Simple web app to track OWASP WSTG security testing progress☆28Sep 12, 2025Updated 7 months ago
- Windows frontend for digging SSH tunnels and creating socks proxies☆12Nov 19, 2023Updated 2 years ago
- Web page to list and filter all the machines in the S4vitar excel dynamically.☆16Jul 5, 2025Updated 9 months ago
- Image eXploit Loader☆14Apr 2, 2025Updated last year
- CVE-2023-21554 Windows MessageQueuing PoC,分析见 https://www.zoemurmure.top/posts/cve_2023_21554/☆59May 18, 2023Updated 2 years ago
- No longer maintained. Timing attacks on a browsers cache to try to predict websites/subreddits that have been viewed☆13Mar 26, 2022Updated 4 years ago
- Wifi Marauder for the 2.8'' ESP32 Module ESP32-2432S028R WiFi+BT Dual-core 240X320 Smart Display. Better know as the CYD.☆13Jun 6, 2024Updated last year
- Powershell script that extracts and steals browser-saved passwords☆20Mar 13, 2023Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Master Thick Client Penetration Testing: Explore practical methodologies, uncover vulnerabilities, and enhance security.☆20Apr 6, 2024Updated 2 years ago
- Welcome to the 403 and 401 Bypass Techniques and Bug Bounty Tips repository! This repo is a collection of methods and strategies to bypas…☆19Dec 26, 2024Updated last year
- Vulnerable Windows Application for Pentesters from the house of DarkRelay Security Labs. The project is along the lines of DVWA, AWSGoat …☆14Dec 28, 2023Updated 2 years ago
- XSS-Checker is a tool used to Check / Validate for XSS vulnerabilities☆18Dec 1, 2022Updated 3 years ago
- Pickaxe is a fast and customizable security scan library which simplifies security testing for web applications like Adobe Experience Man…☆15Dec 5, 2023Updated 2 years ago
- Wifiphisher wifi connect template modified for Wifi Pineapple evilportal module☆11Feb 7, 2017Updated 9 years ago
- S4vitar's desktop enviroment automatic☆12Feb 9, 2023Updated 3 years ago
- Con este script podras crear virus potentes en link ya no es necesario una apk para meterle virus a tu enemig@ ya solo con mandarle el li…☆10Dec 18, 2021Updated 4 years ago
- An eBPF-based behavioral monitor for AI coding agents.☆130Mar 28, 2026Updated 2 weeks ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- This repository was created to put into practice the knowledge acquired in hacking courses at Escola de Hackers with master and mentor Ma…☆19Jul 8, 2024Updated last year
- Tailscale powered TCP port forwarding tool☆28Jan 28, 2026Updated 2 months ago
- CTI Expert — Cyber Threat Intelligence & OSINT analysis skill for Claude Code. 67+ commands, 35 techniques, no API keys required.☆61Apr 8, 2026Updated last week
- This is an advanced ASMI bypass that is currently undetected by Windows Defender and all the Antivirus software's on virustotal.☆26Jun 10, 2025Updated 10 months ago
- SQLiToolkit is a SQL injection Based Toolkit. There are many features such as Vulnerability Scanner, Url Fuzzer in this tool. This is a U…☆13Feb 8, 2022Updated 4 years ago
- Infrastructure as Code (IaC) repository for deploying and managing Azure resources using Bicep. It also includes examples of working with…☆20Mar 1, 2026Updated last month
- ☆14Sep 30, 2021Updated 4 years ago