CyberSecurityUP / Offensive-AI-Agent-PromptsLinks
Prompts for performing tests on your Kali Linux using Gemini-cli, ChatGPT, DeepSeek, CursorAI, Claude Code, and Copilot.
☆208Updated last month
Alternatives and similar repositories for Offensive-AI-Agent-Prompts
Users that are interested in Offensive-AI-Agent-Prompts are comparing it to the libraries listed below
Sorting:
- Passive leak enumeration tool.☆260Updated 2 weeks ago
- ☆169Updated last month
- ☆144Updated 8 months ago
- EVA is an AI-assisted penetration testing agent that enhances offensive security workflows by providing structured attack guidance, conte…☆284Updated 2 weeks ago
- evilwaf is a penetration testing tool designed to detect and bypass common Web Application Firewalls (WAFs).☆302Updated 2 months ago
- ☆196Updated last week
- Laravel RCE Exploitation Toolkit☆50Updated 3 months ago
- Analyze Android native `.so` files☆119Updated 6 months ago
- ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making i…☆161Updated 2 months ago
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup dark forums.☆72Updated 6 months ago
- 🤖 LLM-powered agent for automated Google Dorking in bug hunting & pentesting.☆228Updated last month
- ☆261Updated 4 months ago
- A comprehensive penetration testing operations dashboard for managing projects, tasks, findings, clients, and assets. Built with Next.js,…☆296Updated last month
- SAST and DAST Scan Supported with 400 plus rules available for secrets and allow you add your own wordlist as well. lightweight source c…☆108Updated 5 months ago
- A New Approach to Directory Bruteforce with WaybackLister v1.0☆225Updated 5 months ago
- Physical penetration testing is a critical aspect of security assessment that involves simulating real-world attacks to evaluate the effe…☆86Updated 2 weeks ago
- A powerful CLI tool that uses ZoomEye to search exposed services, gather intelligence, and automate reconnaissance.☆55Updated 7 months ago
- Social Engineering Tactics contains real-world social engineering tactics used for manipulation, persuasion, and deception. Stay aware an…☆45Updated 2 weeks ago
- Curated collection of cybersecurity tools featured in Black Hat Arsenal events.☆123Updated this week
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆129Updated 8 months ago
- ADKAVEH - One PowerShell script for Active Directory discovery and safe attack simulation.☆37Updated 4 months ago
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offe…☆170Updated 10 months ago
- Intelligent web vulnerability analysis suite leveraging Generative AI for developers, pentesters, and security researchers.☆227Updated 3 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆130Updated 10 months ago
- Find S3 AWS/GCP/Azure buckets while surfing. S3DNS acts as DNS server, follows CNAMEs and matches any bucket pattern☆121Updated 4 months ago
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆145Updated last year
- A comprehensive web application security testing toolkit that combines 10 powerful penetration testing features into one tool.☆46Updated 9 months ago
- WebRecon is an advanced Open Source Intelligence (OSINT) web reconnaissance tool designed for cybersecurity professionals, penetration te…☆234Updated 2 weeks ago
- ☆148Updated 8 months ago
- API Pentesting Tools are specialized security tools used to test and analyze the security of Application Programming Interfaces (APIs).☆231Updated 2 weeks ago