Autonomous AI-powered security scanner — multi-agent vulnerability detection, exploitation, and validation engine
☆112Apr 7, 2026Updated last month
Alternatives and similar repositories for BugTraceAI-CLI
Users that are interested in BugTraceAI-CLI are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- header-fuzz allows you to fuzz any HTTP header with a wordlist and evaluate success or failure based on the returning HTTP status code.☆16Apr 15, 2020Updated 6 years ago
- Python-based static analyzer for Android APKs that extracts attack surface and flags high-risk vulnerability patterns with lightweight ta…☆56Feb 22, 2026Updated 2 months ago
- List of Mine Private wordlist i use for fuzzing☆95Feb 25, 2026Updated 2 months ago
- ☆19Updated this week
- Passive JavaScript reconnaissance for penetration testers — bridging Burp Suite traffic into structured, AST-based analysis in VSCode.☆36Feb 5, 2026Updated 3 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Automate Scoping, OSINT and Recon assessments.☆115Feb 3, 2026Updated 3 months ago
- A simple remote scanner for Liferay Portal☆21Apr 6, 2025Updated last year
- Burpsuite Extension for Jsmon☆24Apr 6, 2026Updated last month
- ☆77May 8, 2026Updated last week
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Oct 14, 2023Updated 2 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Feb 6, 2022Updated 4 years ago
- ☆11Oct 9, 2022Updated 3 years ago
- ☆14Oct 14, 2022Updated 3 years ago
- 🛡️ The Ultimate Cybersecurity Library | 160+ curated books, guides & resources covering Ethical Hacking, Penetration Testing, Bug Bounty…☆65Mar 5, 2026Updated 2 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- e2e Scanning research module☆25Mar 26, 2026Updated last month
- SQL, IIS, Oh My...☆21Feb 24, 2025Updated last year
- A simple program to query nmap xml files in the terminal.☆27May 4, 2020Updated 6 years ago
- A curated collection of Living off the Land (LotL) attack demonstrations where trusted binaries go rogue, because if it didn’t launch cal…☆37Jan 7, 2026Updated 4 months ago
- Phantom is project created to perform loading and executing unmanaged code in memory within an IIS environment running in full‑trust mode…☆103Apr 27, 2026Updated 3 weeks ago
- Official Black Hat Arsenal Security Tools Repository☆13Aug 12, 2017Updated 8 years ago
- ☆12Jun 29, 2021Updated 4 years ago
- AI Powered penetration testing Platform for offensive security research☆97May 11, 2026Updated last week
- ☆15Oct 18, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Enhanced, Faster, Better version of the exploit☆25Dec 27, 2025Updated 4 months ago
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆29Feb 15, 2026Updated 3 months ago
- Proxy function calls through the thread pool with ease☆31Feb 27, 2025Updated last year
- Deep Research based on Claude Code's agentic framework 🦉⚡ export const SPINNER_VERBS = [ 'Accomplishing', 'Actioning', 'Actualizin…☆103Apr 4, 2026Updated last month
- 🛡️ Detect and respond to security threats in real-time with God-Eye, an AI-driven tool designed for privacy and local deployment on mult…☆39Updated this week
- Just another vulnerable web application.☆36Jul 27, 2024Updated last year
- Source code for the Foundations of Agentic AI for Retail Book☆23Jan 13, 2026Updated 4 months ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- terraform-oci-arch-ci-cd-devops☆13Jan 21, 2025Updated last year
- Automated Pentest Recon Scanner☆14Oct 6, 2017Updated 8 years ago
- Baseline Landing Zone☆12Dec 6, 2024Updated last year
- Havoc C2 profile generator☆110Mar 4, 2026Updated 2 months ago
- The objective of Smart File Hunter (SFH) is the efficient identification of files containing sensitive information like passwords or priv…☆14Sep 3, 2022Updated 3 years ago
- ☆50Oct 1, 2025Updated 7 months ago
- A clean, minimal, terminal-based global intelligence dashboard.☆281Mar 4, 2026Updated 2 months ago