β36Mar 28, 2025Updated 11 months ago
Alternatives and similar repositories for auto-recon-llm
Users that are interested in auto-recon-llm are comparing it to the libraries listed below
Sorting:
- Vulnerability scanner for AWS customer managed policies using ChatGPTβ167Apr 17, 2023Updated 2 years ago
- An advanced JWT extraction & decoding tool for bug bounty hunters! π΄ββ οΈβ45Mar 24, 2025Updated 11 months ago
- New Framework Red Team Operationsβ20Jun 7, 2021Updated 4 years ago
- NetFuzzer is a comprehensive network security assessment tool for internal and external network components, including Host Machines, Fireβ¦β15Aug 4, 2025Updated 7 months ago
- Project documentation about the development, releasing, and maintenance of the Ubuntu Linux distribution.β22Updated this week
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environmentsβ12Nov 23, 2023Updated 2 years ago
- Notes on Active Directory analysis and exploitationβ11Mar 7, 2019Updated 6 years ago
- ResetRyder - Open Source Brute Force Password Reset Toolβ18Mar 10, 2025Updated 11 months ago
- This is a repo for our docker image of the kubelet binary.β14Updated this week
- Field guide to gather low-hanging fruitsβ14Mar 20, 2025Updated 11 months ago
- Shared features of vscode-clangd and coc-clangdβ13Feb 25, 2026Updated last week
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a β¦β18Aug 7, 2024Updated last year
- Hand list of Powershell commands frequently used during penetration testsβ15Oct 14, 2018Updated 7 years ago
- β18Oct 8, 2024Updated last year
- Automate the build of a vulnerable AD environment.β40Aug 19, 2022Updated 3 years ago
- Python-Based Log Analyzer That Detects Brute-Force Attacks, Directory Traversal, And Suspicious Behavior In System Or Web Server Logs. Bβ¦β20Apr 30, 2025Updated 10 months ago
- Deathstar is an Empire plugin that automates gaining Domain and/or Enterprise Admin rights in Active Directory environments using common β¦β20Mar 24, 2025Updated 11 months ago
- β47Mar 7, 2025Updated 11 months ago
- Scripts for OSCEβ18Dec 28, 2018Updated 7 years ago
- Tactics, Techniques, and Proceduresβ27Jan 20, 2025Updated last year
- Scripted Local Linux Enumeration & Privilege Escalation Checksβ19Mar 26, 2019Updated 6 years ago
- Subdomain Takeover lab is FREE for everyone. This means here is a legal to takeover Subdomain of this website. Here you'll find more thaβ¦β24Jan 1, 2025Updated last year
- A Burp Suite extension to add OpenAI (GPT) on Burp and help you with your Bug Bounty recon to discover endpoints, params, URLs, subdomainβ¦β888May 3, 2023Updated 2 years ago
- PowerShell Obfuscatorβ231Aug 28, 2025Updated 6 months ago
- Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist.β46Mar 4, 2024Updated 2 years ago
- βοΈ A command-line tool for IP address and URL obfuscation/de-obfuscation, providing diverse techniques for enhanced privacy and security.β27Apr 28, 2025Updated 10 months ago
- My pentest cheat sheetβ16Apr 27, 2017Updated 8 years ago
- WPAUDIT: Advanced WordPress security auditing suite & vulnerability scanner. Automates pentesting with Nmap, WPScan, Nuclei, SQLMap. Compβ¦β34May 27, 2025Updated 9 months ago
- My Ubuntu 22.04 VPS general configs and scripts I use for bug bountyβ23Apr 7, 2025Updated 10 months ago
- A collection of notes and script that will help you learn basics of hacking with Pythonβ34Nov 3, 2014Updated 11 years ago
- OSINT mapping using Twitter, Ficklr, Shodan and Insecamβ23Apr 30, 2023Updated 2 years ago
- Atlantic: Automated Data Preprocessing Framework for Machine Learningβ32Feb 2, 2026Updated last month
- LLM-powered bookmark search engineβ30Jan 4, 2025Updated last year
- Returns disallowed paths from robots.txt found on your target domain and snapshotted by the Wayback Machineβ28Jul 18, 2025Updated 7 months ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)β23Jan 3, 2020Updated 6 years ago
- Executes shellcode from a remote server and aims to evade in-memory scannersβ32Nov 17, 2019Updated 6 years ago
- wp-config-scanβ81Sep 6, 2023Updated 2 years ago
- ZoomBotC2 is a stealthy Command and Control (C2) framework that leverages Zoom's API endpoints for covert communication between implants β¦β56Jun 30, 2025Updated 8 months ago
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Maβ¦β49Jul 8, 2025Updated 7 months ago