BrsDincer / Auto-Penetration-AI-Supported-MechanismLinks
AI modular structure that provides automation-based attack and penetration
☆14Updated last year
Alternatives and similar repositories for Auto-Penetration-AI-Supported-Mechanism
Users that are interested in Auto-Penetration-AI-Supported-Mechanism are comparing it to the libraries listed below
Sorting:
- Tool for analyzing SAP Secure Network Communications (SNC).☆52Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆45Updated 2 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- A Red Teaming tool focused on profiling the target.☆27Updated 3 months ago
- A National Vulnerability Database (NVD) API query tool☆17Updated 2 years ago
- MacroExploit use in excel sheet☆20Updated 2 years ago
- Red Team Server (RTS)☆16Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Updated 2 years ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated last year
- ☆38Updated 2 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated 11 months ago
- Public repo of Nuclei scanner templates.☆19Updated 2 years ago
- Manage attack surface data on Elasticsearch☆23Updated last year
- Collection of Tools & Techniques for analyzing URLs☆32Updated 2 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆53Updated 2 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆36Updated this week
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆34Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated last year
- Monitor your target continuously for new subdomains!☆26Updated 2 years ago
- A small executable to trick a user to authenticate using code matching MFA☆69Updated last year
- A network logging tool that logs per process activities☆32Updated 2 years ago
- ☆27Updated 2 years ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Updated last year
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.☆26Updated last year
- ☆22Updated 2 years ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆27Updated 2 years ago
- Updated Exploit - pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814)☆23Updated last year
- Simple Shellcode Runner in Rust Language☆17Updated last year