BrsDincer / Auto-Penetration-AI-Supported-MechanismView external linksLinks
AI modular structure that provides automation-based attack and penetration
☆14May 10, 2024Updated last year
Alternatives and similar repositories for Auto-Penetration-AI-Supported-Mechanism
Users that are interested in Auto-Penetration-AI-Supported-Mechanism are comparing it to the libraries listed below
Sorting:
- ☆11Aug 25, 2023Updated 2 years ago
- This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerSh…☆13Jun 2, 2024Updated last year
- Trojan written in C++ for Windows☆20Mar 12, 2024Updated last year
- LLM Vulnerable Application☆13Aug 19, 2023Updated 2 years ago
- ☆13Sep 8, 2024Updated last year
- web based c2 🏴☠️☆15Aug 10, 2024Updated last year
- Red Team list and cheat sheets☆11Jul 7, 2024Updated last year
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 4 months ago
- All the principles of the AI modular structure that generates malicious code fragments sold on the dark web☆69Apr 30, 2024Updated last year
- AzureAD Pentest☆25Mar 24, 2022Updated 3 years ago
- Malware campaigns and APTs research by BlackArrow☆19Apr 30, 2020Updated 5 years ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Jun 22, 2023Updated 2 years ago
- ☆19Dec 1, 2025Updated 2 months ago
- ADscan is a pentesting tool focused on automating collection, enumeration and common attack paths in Active Directory. It provides an int…☆51Feb 10, 2026Updated last week
- This repo for Windows x32-x64 Kernel/User Mode Exploitation writeups and exploits☆24Oct 20, 2025Updated 3 months ago
- ☆27Apr 28, 2022Updated 3 years ago
- A tool for generating and detecting Unicode domains to identify phishing URLs, aimed at assisting cybersecurity professionals in recogniz…☆30Apr 29, 2025Updated 9 months ago
- my own 2fa bypass methodolgy☆27Sep 22, 2023Updated 2 years ago
- ☆29May 30, 2024Updated last year
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆30Nov 4, 2024Updated last year
- CVE-2023-20052, information leak vulnerability in the DMG file parser of ClamAV☆27May 8, 2023Updated 2 years ago
- The Swiss army knife of evasion tool that bypasses AMSI, Applocker, and CLM mode simultaneously.☆26Mar 9, 2024Updated last year
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆75May 19, 2024Updated last year
- ☆66Jun 5, 2021Updated 4 years ago
- Web Penetration Testing Course Materials☆32May 13, 2024Updated last year
- Simple Python script to sort nuclei scans by severity and URL☆29May 24, 2023Updated 2 years ago
- Final assignment for the course Data Visualization with Python, part of IBM Data Science Professional Certification on Coursera☆11Jun 22, 2020Updated 5 years ago
- ☆131Mar 15, 2023Updated 2 years ago
- A deliberately insecure Java web application☆44Oct 23, 2025Updated 3 months ago
- ☆33Feb 27, 2024Updated last year
- Sliver agents for Mythic☆48Nov 18, 2024Updated last year
- ☆10Sep 24, 2021Updated 4 years ago
- Windows Signature Thief is a program designed to steal the digital signature of one file and install it on another.☆21Dec 9, 2025Updated 2 months ago
- A Python-based voice assistant integrating speech-to-text (STT), text-to-speech (TTS), and powerful AI capabilities using either a local …☆13Dec 8, 2025Updated 2 months ago
- It is a project produced to expose the main logic of OSINT-AI tools offered for sale on the DarkWeb☆37Apr 12, 2024Updated last year
- xsschecker tests endpoints for reflected XSS by injecting payloads and checking responses. It prints vulnerable if the payload is reflect…☆36Nov 3, 2025Updated 3 months ago
- Automate the build of a vulnerable AD environment.☆40Aug 19, 2022Updated 3 years ago
- A slightly more fun way to disable windows defender☆52May 4, 2025Updated 9 months ago
- ☆84Aug 18, 2022Updated 3 years ago