Turn Claude Code into your offensive security research assistant. Specialized AI subagents for authorized penetration testing plan engagements, analyze recon, research exploits, build detections, audit STIGs, and write reports.
☆196Apr 4, 2026Updated this week
Alternatives and similar repositories for pentest-ai-agents
Users that are interested in pentest-ai-agents are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆19Jul 21, 2022Updated 3 years ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆21Jul 1, 2023Updated 2 years ago
- ☆12May 31, 2022Updated 3 years ago
- PowerShell scripts for fast Windows Event Collector configuration with Palantir toolset☆22May 21, 2022Updated 3 years ago
- ☆34Nov 18, 2025Updated 4 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆26Apr 10, 2023Updated 2 years ago
- ☆29Feb 27, 2025Updated last year
- ☆22Jan 26, 2015Updated 11 years ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- Talk with EVM Bytecode using webLLM☆15Jan 26, 2025Updated last year
- A Frida MCP server to enable autonomous AI assistance for Android instrumentation☆83Feb 8, 2026Updated 2 months ago
- ☆14Feb 14, 2018Updated 8 years ago
- ☆18May 30, 2025Updated 10 months ago
- connect mysql plugin of coredns☆13Feb 8, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A collection of tools and scripts used to communicate and emulate Electric Vehicle Communication Controllers (EVCC) and Supply Equipment …☆15Mar 30, 2026Updated last week
- Minimal Indicator Storage System☆11Feb 8, 2021Updated 5 years ago
- Provides a multi-platform Graphical User Interface for hashlookup☆12Jul 12, 2024Updated last year
- a-ray-grass is a yara module that provides support for DCSO-format bloom filters in yara. In the context of hashlookup, it allows quickly…☆14Aug 19, 2022Updated 3 years ago
- Synapse Rapid Power-up for SinkDB☆11Jun 24, 2025Updated 9 months ago
- ☆10Dec 24, 2022Updated 3 years ago
- Lightweight BApp that seamlessly integrates powerful LLM-scanning capabilities into Burp's built-in Scanner with improved accuracy. Suppo…☆37Aug 4, 2025Updated 8 months ago
- ☆12Mar 28, 2022Updated 4 years ago
- Fast program tracing and analysis☆17Mar 23, 2026Updated 2 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Indicators of compromise from to analysis and research by Nextron Threat Research team☆12Sep 17, 2025Updated 6 months ago
- Emulating SAMSUNG HM641JI HDD firmware using Unicorn☆11Sep 19, 2022Updated 3 years ago
- Native cloud infrastructure for automatically running ScubaGear/ScubaGoggles☆34Apr 2, 2026Updated last week
- Historical Observations of Actionable Reputation Data☆13Jun 26, 2018Updated 7 years ago
- An IDA_Wrapper for linux, shipped with an Function Identifier. It works well with Driller on static linked binaries.☆14Sep 12, 2019Updated 6 years ago
- Exploit for CVE-2024-5009☆13Jul 8, 2024Updated last year
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Aug 2, 2020Updated 5 years ago
- Indicators of Normality☆11Jul 22, 2022Updated 3 years ago
- ☆53Mar 16, 2026Updated 3 weeks ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Provides an advanced baseline to implement a secure Windows auditing strategy on Windows OS.☆67Feb 22, 2026Updated last month
- Automated recovery of Linux kernel build configurations☆26Jan 14, 2022Updated 4 years ago
- The fuzzing framework named SHADOWFUZZER to find clientside vulnerabilities when processing incoming MQTT messages.☆20May 10, 2023Updated 2 years ago
- Everything related to YARA☆16Feb 19, 2026Updated last month
- Open source HIDS tailored for Microsoft Windows and Active Directory☆30Feb 13, 2026Updated last month
- Idapro cpu for OpenRISC arch☆15Mar 25, 2017Updated 9 years ago
- Slightly better IDA code folding☆14May 26, 2020Updated 5 years ago