NeuroSploit is an advanced, AI-powered penetration testing framework designed to automate and augment various aspects of offensive security operations. Leveraging the capabilities of large language models (LLMs).
☆879Feb 24, 2026Updated last week
Alternatives and similar repositories for NeuroSploit
Users that are interested in NeuroSploit are comparing it to the libraries listed below
Sorting:
- Open-source offensive security platform for conducting phishing campaigns that weaponizes iCalendar automatic event processing.☆233Dec 18, 2025Updated 2 months ago
- This tool provides an interactive TUI for reviewing Nessus finding exports, running security tools (nmap, netexec, metasploit), and track…☆63Feb 5, 2026Updated 3 weeks ago
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,049Feb 26, 2026Updated last week
- BloodHound-MCP-AI is integration that connects BloodHound with AI through Model Context Protocol, allowing security professionals to anal…☆338Jun 2, 2025Updated 9 months ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,314Nov 12, 2025Updated 3 months ago
- 🛡️ Detect and respond to security threats in real-time with God-Eye, an AI-driven tool designed for privacy and local deployment on mult…☆38Updated this week
- Advanced Blue Team Security Analysis Framework powered by Multiple AI Models☆48Dec 23, 2025Updated 2 months ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆154Dec 26, 2025Updated 2 months ago
- EVA is an AI-assisted penetration testing agent that enhances offensive security workflows by providing structured attack guidance, conte…☆380Feb 24, 2026Updated last week
- Docker container for running CobaltStrike 4.10☆38Sep 18, 2024Updated last year
- PentestAgent is an AI agent framework for black-box security testing, supporting bug bounty, red-team, and penetration testing workflows.☆1,694Feb 25, 2026Updated last week
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- Mythic C2 CheatSheet for OSEP☆60Jan 21, 2026Updated last month
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆47Jan 22, 2025Updated last year
- This C# tool sprays for admin access over the entire domain☆88Dec 7, 2025Updated 2 months ago
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆286Jan 12, 2026Updated last month
- An advanced JWT extraction & decoding tool for bug bounty hunters! 🏴☠️☆45Mar 24, 2025Updated 11 months ago
- Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By f…☆326Oct 20, 2025Updated 4 months ago
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆400Jul 23, 2025Updated 7 months ago
- Impacket☆49Feb 25, 2026Updated last week
- Collection of BOFs created for red team/adversary engagements. Created to be small and interchangeable, for quick recon or eventing.☆237Feb 20, 2026Updated last week
- ☆892Sep 5, 2023Updated 2 years ago
- ☆75Jan 1, 2026Updated 2 months ago
- Autonomous Multi-Agent Based Red Team Testing Service / AI hacker☆832Feb 25, 2026Updated last week
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆112Jan 12, 2024Updated 2 years ago
- RedAudit is a next-generation Windows forensic and security assessment framework featuring a live cyber-operations GUI built for real inv…☆35Nov 15, 2025Updated 3 months ago
- Attack Active Directory Trusts with a single tool☆14Jan 15, 2025Updated last year
- ☆20Sep 6, 2025Updated 5 months ago
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆20Sep 27, 2024Updated last year
- Cybersecurity AI (CAI), the framework for AI Security☆7,262Jan 30, 2026Updated last month
- ☆85May 15, 2025Updated 9 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆228Mar 28, 2025Updated 11 months ago
- A deliberately vulnerable Microsoft Entra ID environment. Learn identity security through hands-on, realistic attack challenges.☆895Jan 15, 2026Updated last month
- ATHF is a framework for agentic threat hunting - building systems that can remember, learn, and act with increasing autonomy.☆178Feb 16, 2026Updated 2 weeks ago
- CSharp4Pentesters☆11Mar 5, 2022Updated 4 years ago
- Rust Weaponization for Red Team Engagements.☆12Nov 14, 2022Updated 3 years ago
- Context-aware Nmap reconnaissance framework with traffic intelligence and AD awareness☆26Feb 4, 2026Updated last month
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆220Sep 25, 2025Updated 5 months ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆195Feb 6, 2025Updated last year