AI Powered penetration testing Platform for offensive security research
☆71Apr 26, 2026Updated this week
Alternatives and similar repositories for nyxstrike
Users that are interested in nyxstrike are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Continued expansion of the hexstrike-ai project 📦 Sincere thanks hexstrike-ai!☆48Sep 8, 2025Updated 7 months ago
- 🛡️ Comprehensive AI-powered security framework combining Villager AI (autonomous penetration testing) with HexStrike AI (150+ security t…☆66Oct 18, 2025Updated 6 months ago
- Python tool to write an image to a Gicisky tag☆14Nov 30, 2025Updated 4 months ago
- An HTTP proxy library for Go☆16Jun 22, 2022Updated 3 years ago
- ☆27Feb 13, 2026Updated 2 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- experimenting w/ apple script for various macOS functionality☆14Aug 4, 2019Updated 6 years ago
- regex Hunter- Fast website endpoint sensitive data and Leaks JS files endpoint API Key Scraper☆12Jun 8, 2024Updated last year
- miscellaneous sploit scripts/hacks☆18Feb 3, 2025Updated last year
- a collection of wordlist for different projects☆13Oct 12, 2024Updated last year
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- Provides temporary admin access for a standard user via Jamf Self Service☆10Oct 25, 2023Updated 2 years ago
- A basic Android background service that connects to a remote server, executes commands, and returns encrypted output. Disguised as a syst…☆22Aug 2, 2025Updated 8 months ago
- BLE Beacons ST17H66☆15May 20, 2021Updated 4 years ago
- A modular, agentic-AI-based adaptive cybersecurity architecture for digital ecosystems. Combines Zero Trust, real-time telemetry, and int…☆21Jul 4, 2025Updated 9 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 18, 2020Updated 5 years ago
- Bullet-proof your custom GPT system prompt security with KEVLAR, the ultimate prompt protector against rules extraction, prompt injection…☆19Apr 12, 2024Updated 2 years ago
- Prompts for ChatGPT 4 useful for developers, cybersecurity professionals, hackers and IT workers☆12Mar 20, 2023Updated 3 years ago
- Nemesys: A personal educational project designed to automate the discovery of vulnerabilities 🕵️♂️ using Metasploit 🚀. Learn how to id…☆13May 25, 2025Updated 11 months ago
- Developer documentation for the WiFi Pineapple Mark 7 - product documentation can be found at docs.hak5.org☆60Jun 25, 2025Updated 10 months ago
- penGUI take cure of eggs!☆10Jun 22, 2024Updated last year
- An advanced WiFi scanning and packet sniffing toolkit for the ESP32-C5, featuring a cyberpunk-inspired web interface.☆46Mar 1, 2025Updated last year
- The Demo for CVE-2018-1000006☆39Jan 25, 2018Updated 8 years ago
- This project provides a web interface to send a payload via SMS, display device information upon successful delivery, and control the dev…☆23Mar 26, 2026Updated last month
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Custom Hardware and Firmware Bin Files for the PortaRF Gadget☆38Dec 28, 2025Updated 4 months ago
- Google Hacking using Prompt ChatGPT☆15Jun 3, 2023Updated 2 years ago
- Keyfob Analysis Tool☆66Mar 22, 2026Updated last month
- Crypto Wallet Hunter: A program to find cryptocurrency wallets with balances. Supports BTC, ETH, TRX, and BNB. Features multi-threaded se…☆13Jan 10, 2025Updated last year
- Welcome to my Cybersecurity Homelab, where I experiment with ethical hacking, penetration testing, network security, AI Agent automation …☆18Mar 11, 2025Updated last year
- My revision of Jhewits Wardriver☆18Jul 23, 2024Updated last year
- Documentation Repo for WiFi Pineapple Pager Mods made by Glytch☆33Jan 16, 2026Updated 3 months ago
- A research project to crawl and analyze Top 1 million domains☆25Feb 7, 2023Updated 3 years ago
- Educational tool for simulating Instagram login and 2FA mechanisms. Designed for ethical hacking and cybersecurity training.☆21Jul 29, 2025Updated 8 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Complete Malware Index - Use at your own Risk!☆19Sep 2, 2024Updated last year
- TeleStrike is a red team utility designed for adversary simulation and security auditing of Telegram accounts. Built for educational and …☆45Aug 1, 2025Updated 8 months ago
- Upgrading jsleak with a CI/CD and new rules☆17May 6, 2023Updated 2 years ago
- This is a PAM Skeleton Key that can be used for persistence, lateral movement, and privilege escalation.☆43Updated this week
- 此Suricata IDS Rules 用于检测网络攻击行为,支持常见C2工具/中间件漏洞利用/Frp隧道/HTTP隧道/TCP隧道/常见webshell/redis未授权/Shiro反序列化/Fastjson反序列化/挖矿/SQL注入等特征☆26Sep 5, 2025Updated 7 months ago
- Passive JavaScript reconnaissance for penetration testers — bridging Burp Suite traffic into structured, AST-based analysis in VSCode.☆36Feb 5, 2026Updated 2 months ago
- Quick and dirty (read: effective) administration, including some rather obscure pieces of information.☆14Aug 17, 2020Updated 5 years ago