Turn Claude Code into your offensive security research assistant. Specialized AI subagents for authorized penetration testing plan engagements, analyze recon, research exploits, build detections, audit STIGs, and write reports.
☆344Apr 16, 2026Updated 2 weeks ago
Alternatives and similar repositories for pentest-ai-agents
Users that are interested in pentest-ai-agents are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Autonomous bug-bounty framework for Claude Code — 40 specialist agents, exploit-chain builder, writeup search, and live HackerOne/Bugcrow…☆200Updated this week
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆21Jul 1, 2023Updated 2 years ago
- ☆19Jul 21, 2022Updated 3 years ago
- Autonomous Multi-Agent Based Red Team Testing Service / AI hacker☆20Sep 15, 2025Updated 7 months ago
- A real-time liminal Quake/Hammer-style CSG level editor and game engine. Optimised for mobile CPUs☆116Apr 23, 2026Updated last week
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Exploit for CVE-2024-5009☆13Jul 8, 2024Updated last year
- Remote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Feb 12, 2024Updated 2 years ago
- Scripts created by AI Agents to use as tools for data collection. These are examples of Inforensics JITT (Just-In-Time Tool) Agent.☆14Jul 7, 2024Updated last year
- Provides an advanced baseline to implement a secure Windows auditing strategy on Windows OS.☆67Feb 22, 2026Updated 2 months ago
- ☆83Mar 4, 2026Updated last month
- ☆15Apr 10, 2025Updated last year
- The Shodan MCP Server by ADEO Cybersecurity Services provides cybersecurity professionals with streamlined access to Shodan's powerful re…☆20Mar 22, 2025Updated last year
- POC for CVE-2024-36401. This POC will attempt to establish a reverse shell from the vlun targets.☆35Jul 4, 2024Updated last year
- Educational repository with source code examples☆12Jun 3, 2025Updated 10 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- 15,000 most of common SSID names from https://wigle.net/stats#ssidstats☆11Nov 26, 2025Updated 5 months ago
- A neat CTFd Dark Theme☆19Feb 1, 2019Updated 7 years ago
- Vulnerability Data Tracer - Published at Phrack 67 Article☆16Dec 12, 2014Updated 11 years ago
- Apache HugeGraph Server Unauthenticated RCE - CVE-2024-27348 Proof of concept Exploit☆18Jun 3, 2024Updated last year
- Threat-Surface helps with daily tracking of exposed servers, open ports, and infrastructure used by threat actors.☆53Jan 16, 2026Updated 3 months ago
- An advanced scanner for exposed secrets in web pages, APIs, and source code.☆13Apr 22, 2025Updated last year
- AI-powered bug bounty hunting from your terminal - recon, 20 vuln classes, autonomous hunting, and report generation. All inside Claude…☆1,877Apr 20, 2026Updated last week
- Updated Exploit - pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814)☆23Jul 23, 2024Updated last year
- ☆34Nov 18, 2025Updated 5 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- All the code snippets from my Secure Code Review series on youtube (youtube.com/@muqsitbaig)!☆25Jul 28, 2024Updated last year
- Tool to read EVTX files including SYSMON and convert to JSON, MISP Objects and Graph stream☆12Oct 29, 2020Updated 5 years ago
- 基于django网站监控平台☆12Jul 6, 2020Updated 5 years ago
- ☆18Jan 26, 2024Updated 2 years ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆63Oct 28, 2023Updated 2 years ago
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆76Jul 31, 2024Updated last year
- Detection for CVE-2025-61882 & CVE-2025-61884☆36Oct 14, 2025Updated 6 months ago
- Burp Plugin to decrypt AES encrypted traffic on the fly☆19May 13, 2021Updated 4 years ago
- This project was created to bring together most of the tools used in CTF to solve steganography challenges.☆18Jul 26, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Exploit POC for CVE-2024-36877☆48Aug 14, 2024Updated last year
- Multilayered secret detection tool☆42Feb 11, 2026Updated 2 months ago
- A simple web-scraped API for Demon Slayer fans☆17Jun 4, 2022Updated 3 years ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- Red teaming is an attack technique used in cyber security to test how an organisation would respond to a genuine cyber attack. It is done…☆28Apr 15, 2025Updated last year
- ☆14Feb 14, 2018Updated 8 years ago
- ☆14Dec 26, 2022Updated 3 years ago