0xSojalSec / DecepticonLinks
Autonomous Multi-Agent Based Red Team Testing Service / AI hacker
☆19Updated 4 months ago
Alternatives and similar repositories for Decepticon
Users that are interested in Decepticon are comparing it to the libraries listed below
Sorting:
- A comprehensive modern architecture model is proposed to integrate platform solutions and tooling to support a professional Red Team.☆148Updated 2 weeks ago
- AI / LLM Red Team Field Manual & Consultant’s Handbook☆229Updated this week
- An AI-driven vulnerability scanner that uses Nmap to discover open services on a user-supplied IP, matches each service to relevant CVEs …☆47Updated 7 months ago
- VulnSeer combines the power of Nmap's service detection with multiple AI providers to deliver intelligent vulnerability assessments. Unli…☆42Updated 7 months ago
- EvilMist is a collection of scripts and utilities designed to support cloud penetration testing & red teaming. The toolkit helps identify…☆85Updated last week
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆79Updated 4 months ago
- AutoPentestX – Linux Automated Pentesting & Vulnerability Reporting Tool☆74Updated last month
- A small executable to trick a user to authenticate using code matching MFA☆69Updated 2 years ago
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆76Updated 9 months ago
- A real fake social engineering app☆130Updated 6 months ago
- 🤖 The Modern, Blazing Fast Port Scanner 🤖☆28Updated last year
- ☆55Updated 2 months ago
- ☆58Updated 7 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆126Updated last month
- ☆340Updated this week
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Updated last year
- Universal exploitation tool for CVE-2025-33073 targeting Windows Domain Controllers with DNSAdmins privileges and WinRM enabled.☆63Updated 2 months ago
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆41Updated 9 months ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆19Updated 4 months ago
- Laravel RCE Exploitation Toolkit☆48Updated 2 months ago
- ☆65Updated last year
- ☆105Updated 4 months ago
- SpicyAD is a C# Active Directory penetration testing tool designed for authorized security assessments. It combines multiple AD attack te…☆95Updated last month
- Exploits Unauth Docker API☆43Updated 9 months ago
- Open-source offensive security platform for conducting phishing campaigns that weaponizes iCalendar automatic event processing.☆215Updated last month
- 🔒 Modern C2 Platform with Cloudflare Tunnel Integration | WinRM & SSH Remote Management | Real-time Terminal & Remote Desktop | Built wi…☆89Updated 3 weeks ago
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆165Updated 5 months ago
- Vast.ai Password Kracking☆92Updated 3 months ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆97Updated 9 months ago
- 🎒 An up-to-date collection of precompiled binaries and hacking scripts.☆47Updated 3 weeks ago