HackAgent is an open-source security toolkit to detect vulnerabilities of your AI Agents
☆46May 14, 2026Updated last week
Alternatives and similar repositories for hackagent
Users that are interested in hackagent are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆46Oct 10, 2025Updated 7 months ago
- 检测邮件发送的可行性,可用来红队作战中对目标邮箱账户测试。The feasibility sent by the detection mail can be used for the target mailbox account test in the Red Team b…☆10May 8, 2023Updated 3 years ago
- ☆11Nov 22, 2021Updated 4 years ago
- Validate STIX and CybOX XML documents☆26Feb 16, 2024Updated 2 years ago
- just an experiment☆22Sep 5, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Cloud threat detection visualization from excalidraw☆12Apr 25, 2022Updated 4 years ago
- Bhadra is a Vulnerability Management Platform to handle all security issues☆16Mar 2, 2026Updated 2 months ago
- Exploit for CVE-2022-26134: Confluence Pre-Auth Remote Code Execution via OGNL Injection☆13Jul 24, 2022Updated 3 years ago
- CVE-2025-49844 – Redis Lua Parser Use-After-Free☆65Oct 7, 2025Updated 7 months ago
- A series of python scripts to extract information from Dark Web Applications☆14Mar 26, 2025Updated last year
- A basic python based tool for domain ℹ️ information gathering. I am working 💻 on collecting information related to domain whois, history…☆13Jan 11, 2026Updated 4 months ago
- DPG Campus Tool. Shrink massive PDFs to fit AI upload limits. Sanitize before uploading to reduce risk of exposing sensitive data.☆46Jan 20, 2026Updated 4 months ago
- HACKING BOT is an automated bug bounty tool that streamlines security testing by running multiple cybersecurity tools in parallel. It all…☆20Mar 6, 2025Updated last year
- Vstream - Video Analytics pipeline with Hardware based accelerations (dev - stage)☆10Feb 2, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A collection of open source threat detection rules created by Cyber Castle's team.☆14Jun 2, 2022Updated 3 years ago
- a residual network for image steganalysis☆18Sep 28, 2017Updated 8 years ago
- An implementation of MSSRM method☆10Mar 23, 2023Updated 3 years ago
- Modified version of PEAS client for offensive operations☆51Updated this week
- Process Hollowing POC in CPP☆19Oct 29, 2020Updated 5 years ago
- KQLIntel is a browser-based tool that uses LLMs to convert threat intelligence reports into actionable Kusto Query Language (KQL) queries…☆30Aug 4, 2025Updated 9 months ago
- Collection of various WINAPI tricks / features used or abused by Malware☆13Mar 28, 2022Updated 4 years ago
- DETR tensor去除推理过程无用辅助头+fp16部署再次加速+解决转tensorrt 输出全为0问题的新方法。☆11Jan 9, 2024Updated 2 years ago
- Exploring advanced prompting tools to query SQL database with multiple tables in natural language using LLMs☆16Aug 23, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Continuous Threat Exposure Management Maturity Model (CTEMMM)☆32Feb 6, 2026Updated 3 months ago
- A lightweight test harness designed to speed up shellcode development by providing an execution environment with integrated crash diagnos…☆44Jan 15, 2026Updated 4 months ago
- ☆18Jul 20, 2024Updated last year
- Inject JS and C# into Windows apps, call COM and WinRT APIs☆101Jul 29, 2019Updated 6 years ago
- Python-Based Log Analyzer That Detects Brute-Force Attacks, Directory Traversal, And Suspicious Behavior In System Or Web Server Logs. B…☆19Apr 30, 2025Updated last year
- A collection of 10 network security tools using Scapy for traffic analysis, penetration testing, and network manipulation. Ideal for cybe…☆17Oct 20, 2024Updated last year
- 用于Linux应急响应,快速排查异常用户登录情况和入侵信息排查,准确定位溯源时间线,高效辅助还原攻击链。☆23Nov 1, 2024Updated last year
- burp被动插件扫反射xss☆13Nov 29, 2023Updated 2 years ago
- Code for Rethinking Prompt Optimizers: From Prompt Merits to Optimization☆13Jan 12, 2026Updated 4 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- this repository made to help me All Dorking repositories find for one location☆36Aug 31, 2025Updated 8 months ago
- Smarter Asset Search, Faster Information Extraction ZoomEye GPT is a browser extension designed specifically for cybersecurity profession…☆26Apr 30, 2025Updated last year
- official implementation of Training-free Boost for Open-Vocabulary Object Detection with Confidence Aggregation☆13Apr 15, 2024Updated 2 years ago
- Delphi-Kawaii is a plugin for Ida Pro.☆22Jul 19, 2023Updated 2 years ago
- Automate All Pivoting System Enumeration with this Bash Script☆13Nov 7, 2022Updated 3 years ago
- Simulate virus pandemic in your browser. Change virus settings to visualize how different settings affect the spread of the disease.☆12Jan 5, 2023Updated 3 years ago
- ☆13Jan 22, 2025Updated last year