AI modular structure that provides automation-based attack and penetration
☆14May 10, 2024Updated last year
Alternatives and similar repositories for Auto-Penetration-AI-Supported-Mechanism
Users that are interested in Auto-Penetration-AI-Supported-Mechanism are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Within the scope of psychology, it is an LLM AI-Bot research aimed at increasing human interaction with AI.☆23Nov 12, 2023Updated 2 years ago
- All the principles of the AI modular structure that generates malicious code fragments sold on the dark web☆69Apr 30, 2024Updated last year
- ☆13Sep 8, 2024Updated last year
- Example configuration Beelzebub honeypot 🚀☆22Jun 26, 2025Updated 9 months ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 5 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Feb 1, 2022Updated 4 years ago
- Tools for Incident Response and Malware Analysis☆11Feb 9, 2025Updated last year
- ☆11Sep 15, 2023Updated 2 years ago
- This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerSh…☆14Jun 2, 2024Updated last year
- ☆12Aug 25, 2023Updated 2 years ago
- Trojan written in C++ for Windows☆20Mar 12, 2024Updated 2 years ago
- LLM Vulnerable Application☆13Aug 19, 2023Updated 2 years ago
- VTC - Velociraptor Timeline Creator☆19May 15, 2024Updated last year
- Red Team list and cheat sheets☆11Jul 7, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆31Nov 4, 2024Updated last year
- Malware campaigns and APTs research by BlackArrow☆19Apr 30, 2020Updated 5 years ago
- web based c2 🏴☠️☆15Aug 10, 2024Updated last year
- ioc2rpz webgui☆17Feb 13, 2026Updated last month
- A set of tools and resources for analysis of Havoc C2☆28Feb 27, 2024Updated 2 years ago
- Execute embedded Mimikatz☆13Nov 24, 2021Updated 4 years ago
- A bash script that automates the process of service discovery on specified target hosts. The aim of the scripts is reducing scan time, in…☆11May 14, 2025Updated 10 months ago
- ☆65Jun 5, 2021Updated 4 years ago
- ☆12Jun 20, 2022Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A Python-based voice assistant integrating speech-to-text (STT), text-to-speech (TTS), and powerful AI capabilities using either a local …☆17Dec 8, 2025Updated 3 months ago
- AzureAD Pentest☆25Mar 24, 2022Updated 4 years ago
- This repo for Windows x32-x64 Kernel/User Mode Exploitation writeups and exploits☆24Oct 20, 2025Updated 5 months ago
- A training course on Web Security, Exploit Development and Source Code Auditing from 2009.☆12Feb 15, 2022Updated 4 years ago
- Qakbot Registry Key Configuration Decryptor☆14Dec 20, 2021Updated 4 years ago
- ☆19Dec 1, 2025Updated 3 months ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Jun 22, 2023Updated 2 years ago
- CVE-2023-20052, information leak vulnerability in the DMG file parser of ClamAV☆27May 8, 2023Updated 2 years ago
- decompiled pegasus_spyware☆14Jul 31, 2021Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Trufflehunter is a tool that uses DNS cache snooping on public DNS resolvers to measure the prevalence of rare applications and domains o…☆23Mar 23, 2021Updated 5 years ago
- Security conferences talks☆25Jul 10, 2020Updated 5 years ago
- ☆15Nov 11, 2021Updated 4 years ago
- Mythic C2 CheatSheet for OSEP☆62Jan 21, 2026Updated 2 months ago
- ☆114Aug 25, 2023Updated 2 years ago
- A python script to check printer across the world that allow printing on port 9100 trough pjl☆14Dec 27, 2024Updated last year
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Jul 15, 2023Updated 2 years ago