Turn Claude Code into your offensive security research assistant. Specialized AI subagents for authorized penetration testing plan engagements, analyze recon, research exploits, build detections, audit STIGs, and write reports.
☆1,393May 3, 2026Updated 2 weeks ago
Alternatives and similar repositories for pentest-ai-agents
Users that are interested in pentest-ai-agents are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- POC for CVE-2024-36401. This POC will attempt to establish a reverse shell from the vlun targets.☆35Jul 4, 2024Updated last year
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆21Jul 1, 2023Updated 2 years ago
- Es una herramienta para hacer geolocalizacion - hecha en python - es multifuente y correlaciona info de multiples fuentes☆32Aug 16, 2025Updated 9 months ago
- AndroidSubSystem4GNU/Linux☆44Dec 30, 2025Updated 4 months ago
- This project provides a set of Google Apps Scripts designed to help you identify and analyze potentially malicious domains directly from …☆14Sep 4, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆19Jul 21, 2022Updated 3 years ago
- Provides an advanced baseline to implement a secure Windows auditing strategy on Windows OS.☆67Feb 22, 2026Updated 2 months ago
- Penstaller: A Python tool to automate the installation of essential bug bounty and pentesting tools. With one command, it sets up tools f…☆18Mar 14, 2025Updated last year
- Autonomous Multi-Agent Based Red Team Testing Service / AI hacker☆20Sep 15, 2025Updated 8 months ago
- Detection for CVE-2025-61882 & CVE-2025-61884☆36Oct 14, 2025Updated 7 months ago
- Windows绕过EDR实现DumpHash☆231May 10, 2026Updated last week
- GeoServer Remote Code Execution☆87Apr 6, 2025Updated last year
- AI-powered vulnerability scanner extension for Burp Suite with multi-provider support (Ollama, OpenAI, Claude, Gemini)☆284Mar 19, 2026Updated 2 months ago
- An introduction to detection engineering☆14Jan 3, 2025Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆63Oct 28, 2023Updated 2 years ago
- ☆59Dec 10, 2025Updated 5 months ago
- Exploit for CVE-2024-5009☆13Jul 8, 2024Updated last year
- Remote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Feb 12, 2024Updated 2 years ago
- CVE-2025-24799 Exploit: GLPI - Unauthenticated SQL Injection☆33Apr 15, 2025Updated last year
- GeoServer & GeoTools SQL Injection (CVE-2023-25157 & CVE-2023-25158)☆14Jun 11, 2023Updated 2 years ago
- This contains common OSCP local exploits and enumeration scripts☆12Sep 18, 2015Updated 10 years ago
- local trading of BNB and Meme Rush tokens on Binance Smart Chain☆28Apr 16, 2026Updated last month
- Passive JavaScript reconnaissance for penetration testers — bridging Burp Suite traffic into structured, AST-based analysis in VSCode.☆36Feb 5, 2026Updated 3 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- LFIter2 Local File Include (LFI) Tool - Auto File Extractor & Username Bruteforcer☆17Nov 11, 2016Updated 9 years ago
- Terminal UI for browsing cloud storage via rclone☆45Mar 7, 2026Updated 2 months ago
- Go实现用于Windows系统的进程隐藏工具,通过DLL注入技术将指定进程从任务管理器中隐藏☆27Jan 22, 2026Updated 4 months ago
- A list of OSINT resources and tools that may be useful to you when conducting investigations related to the Democratic People's Republic …☆36May 1, 2025Updated last year
- Jenkins pre-auth RCE exploit. More info at https://jenkins.io/security/advisory/2019-01-08/#SECURITY-1266 https://blog.orange.tw/2019/02/…☆10Mar 15, 2019Updated 7 years ago
- It’s an OSINT reconnaissance poc powered by Local LLMs (Ollama). You can feed it an email, domain, or IP, and it automatically performs m…☆83Nov 20, 2025Updated 6 months ago
- Windows 7 Professional 7601 Service Pack 1 is vulnerable to eternalblue exploit and while exploiting this myself i ran into a number of i…☆11Jun 27, 2021Updated 4 years ago
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆31Jun 2, 2024Updated last year
- ☆39Feb 9, 2025Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Vulnerability Data Tracer - Published at Phrack 67 Article☆16Dec 12, 2014Updated 11 years ago
- An AI-powered cybersecurity agent inspired by Claude Agent SDK, designed exclusively for defensive security operations.☆80Dec 29, 2025Updated 4 months ago
- Apache HugeGraph Server Unauthenticated RCE - CVE-2024-27348 Proof of concept Exploit☆18Jun 3, 2024Updated last year
- This tool automates the process of running FFUF (Fuzz Faster U Fool) and post-processing its results to extract valid URLs. It supports b…☆36Nov 5, 2024Updated last year
- Threat-Surface helps with daily tracking of exposed servers, open ports, and infrastructure used by threat actors.☆55May 12, 2026Updated last week
- bash script to prepare Debian machines for OSINT use☆11Apr 10, 2020Updated 6 years ago
- A lightweight and simple directory buster.☆16Sep 9, 2023Updated 2 years ago