EVA is an AI-assisted penetration testing agent that enhances offensive security workflows by providing structured attack guidance, contextual analysis, and multi-backend AI integration.
☆380Feb 24, 2026Updated last week
Alternatives and similar repositories for EVA
Users that are interested in EVA are comparing it to the libraries listed below
Sorting:
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆29Feb 15, 2026Updated 2 weeks ago
- PentestAgent is an AI agent framework for black-box security testing, supporting bug bounty, red-team, and penetration testing workflows.☆1,694Feb 25, 2026Updated last week
- NoMoreStealers is a Windows file system minifilter driver that protects sensitive user data from untrusted processes.☆96Nov 7, 2025Updated 3 months ago
- ☆58Dec 10, 2025Updated 2 months ago
- Yet another machine learning-based WAF research☆26Jun 21, 2022Updated 3 years ago
- Enhanced, Faster, Better version of the exploit☆25Dec 27, 2025Updated 2 months ago
- Phantom Keylogger is an advanced, stealth-enabled keystroke and visual intelligence gathering system.☆75Dec 10, 2025Updated 2 months ago
- 🛡️ Detect and respond to security threats in real-time with God-Eye, an AI-driven tool designed for privacy and local deployment on mult…☆38Updated this week
- An advanced networking tool for penetration testing... A place where floats and integers always win.☆29Aug 18, 2025Updated 6 months ago
- Prompts for performing tests on your Kali Linux using Gemini-cli, ChatGPT, DeepSeek, CursorAI, Claude Code, and Copilot.☆217Dec 20, 2025Updated 2 months ago
- Agentic SOC Platform: A powerful, flexible, open-source, and agent-centric automated security operations platform☆587Updated this week
- PowerShell SharePoint extraction + auditing tool for red/blue/purple teams. Enumerates all SharePoint sites/drives a user can access via …☆114Jan 25, 2026Updated last month
- Security tools for purple team, AI security, and M365/GWS. Authorized use only.☆53Feb 23, 2026Updated last week
- CyberFind — a next-generation OSINT reconnaissance tool designed for cybersecurity professionals, penetration testers, and digital invest…☆58Feb 21, 2026Updated last week
- NeuroSploit is an advanced, AI-powered penetration testing framework designed to automate and augment various aspects of offensive securi…☆879Feb 24, 2026Updated last week
- A portable C# utility for enumerating local and remote windows sessions☆56Jan 1, 2026Updated 2 months ago
- A resource full of Crypto/OSINT tools, techniques and training courses for CTI, AML, and forensic investigations.☆119Dec 23, 2025Updated 2 months ago
- LLMON 🍋 - The World's First Web Adversarial AI Firewall☆40Jan 3, 2026Updated 2 months ago
- "Your Fully-Automated Personal AI Assistant"☆49Oct 16, 2025Updated 4 months ago
- AutoPentestX – Automated Pentesting & Vulnerability Reporting Tool☆1,003Feb 2, 2026Updated last month
- Analyze Android native `.so` files☆118Jul 28, 2025Updated 7 months ago
- Open Source Implementation of Cobalt Strike's Malleable C2☆94Jan 27, 2026Updated last month
- Ip-Recon is a python powerful reconnaissance tool for retrieving ip address information by using Geo.ipfy API, it developed for termux a…☆37Jul 13, 2024Updated last year
- A beginner-friendly collection of Rust notes focused on Red Team Tooling • Malware Development • Systems Programming • Rust Fundamentals☆58Nov 24, 2025Updated 3 months ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆47Jan 22, 2025Updated last year
- This repository consists of extensions, that hacktron uses to execute specific workflows in CLI.☆89Dec 27, 2025Updated 2 months ago
- A modern platform for visual, flexible, and extensible graph-based investigations. For cybersecurity analysts and investigators.☆2,604Feb 16, 2026Updated 2 weeks ago
- Universal exploitation tool for CVE-2025-33073 targeting Windows Domain Controllers with DNSAdmins privileges and WinRM enabled.☆65Nov 14, 2025Updated 3 months ago
- ☆55Nov 18, 2025Updated 3 months ago
- Red Team tools containerized☆76Dec 6, 2025Updated 2 months ago
- All-in-one offensive security toolbox with AI agent and MCP architecture. Integrates tools like Nmap, Metasploit, FFUF, SQLMap. Enables p…☆653Jun 5, 2025Updated 9 months ago
- Autonomous Multi-Agent Based Red Team Testing Service / AI hacker☆832Feb 25, 2026Updated last week
- ATHF is a framework for agentic threat hunting - building systems that can remember, learn, and act with increasing autonomy.☆178Feb 16, 2026Updated 2 weeks ago
- Integrate LLM models directly into Ghidra for automated code refactoring and analysis.☆246Dec 16, 2025Updated 2 months ago
- world's first Opensource fully Autonomous AI Security Engineer☆236Nov 18, 2025Updated 3 months ago
- RedAudit is a next-generation Windows forensic and security assessment framework featuring a live cyber-operations GUI built for real inv…☆35Nov 15, 2025Updated 3 months ago
- CVE-2025-55182-bypass-waf☆31Jan 8, 2026Updated last month
- The code implements ransomware-like behavior, encrypting files by changing their extensions to "k3vil." It includes a decryption process …☆19May 23, 2024Updated last year
- A simple self-hosted tool to capture, inspect, and debug incoming webhooks in real time.☆26Oct 28, 2025Updated 4 months ago