13o-bbr-bbq / GyoiThon
GyoiThon is a growing penetration test tool using Machine Learning.
☆18Updated 5 years ago
Alternatives and similar repositories for GyoiThon
Users that are interested in GyoiThon are comparing it to the libraries listed below
Sorting:
- SAIVS (Spider Artificial Intelligence Vulnerability Scanner).☆55Updated 4 years ago
- A simple shell script which utilizes nmap, nikto, dirb, enum4linux and other open source goodies to automate enumeration process.☆20Updated 3 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- Automated Pentest Tools Designed For Parrot Linux☆86Updated 6 years ago
- ArmourBird CSF - Container Security Framework☆44Updated 3 years ago
- The system is broken face recognition for adversarial example testing.☆19Updated 3 years ago
- Interactive Post Exploitation Tool☆36Updated 5 years ago
- Android Automation Tool☆21Updated 7 years ago
- Network/WebApplication Information Gathering, Enumeration and Vulnerability Scanning (Under Development)☆17Updated 6 years ago
- Real Time Threat Monitoring Tool☆112Updated 2 years ago
- A list to discover work of red team tooling and methodology for penetration testing and security assessment☆78Updated 6 years ago
- a hash query tool☆37Updated 6 years ago
- Repo for proof of concept exploits and tools.☆56Updated 4 years ago
- Tool to predict attacker groups from the techniques and software used☆49Updated 3 years ago
- Collection of scripts that aid in penetration testing of JSON Web Tokens☆58Updated 6 years ago
- Host-based vulnerability scanner. Find installed packages on the host, ask their vulnerabilities to vulmon.com API and print vulnerabilit…☆15Updated 6 years ago
- Automated information gathering tool for pentest☆54Updated 8 years ago
- python script allow red teaming , hackthebox Pwners , OSCP lovers to shorten their time by these useful shells☆33Updated 4 years ago
- ☆101Updated 7 years ago
- Essential tool for finding blind injection attacks.☆50Updated 6 years ago
- Burp extension to help developers replicate findings from pen tests☆70Updated 9 months ago
- Automate SSH communication with firewalls, switches, etc.☆26Updated 7 years ago
- ☆9Updated 7 years ago
- A CRLF ( Carriage Return Line Feed ) Injection attack occurs when a user manages to submit a CRLF into an application. This is most commo…☆46Updated 3 years ago
- ☆34Updated 6 years ago
- ZIP File Raider - Burp Extension for ZIP File Payload Testing☆71Updated 4 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Updated 6 years ago
- Automate Metasploit scanning and exploitation☆115Updated 7 months ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆76Updated 6 years ago