CyberSecurityUP / auto-recon-llmView external linksLinks
β35Mar 28, 2025Updated 10 months ago
Alternatives and similar repositories for auto-recon-llm
Users that are interested in auto-recon-llm are comparing it to the libraries listed below
Sorting:
- Vulnerability scanner for AWS customer managed policies using ChatGPTβ167Apr 17, 2023Updated 2 years ago
- An advanced JWT extraction & decoding tool for bug bounty hunters! π΄ββ οΈβ45Mar 24, 2025Updated 10 months ago
- New Framework Red Team Operationsβ20Jun 7, 2021Updated 4 years ago
- Project documentation about the development, releasing, and maintenance of the Ubuntu Linux distribution.β20Updated this week
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environmentsβ12Nov 23, 2023Updated 2 years ago
- NetFuzzer is a comprehensive network security assessment tool for internal and external network components, including Host Machines, Fireβ¦β15Aug 4, 2025Updated 6 months ago
- This is a repo for our docker image of the kubelet binary.β13Feb 4, 2026Updated last week
- Field guide to gather low-hanging fruitsβ14Mar 20, 2025Updated 10 months ago
- Shared features of vscode-clangd and coc-clangdβ13Feb 3, 2026Updated last week
- β18Oct 8, 2024Updated last year
- Python-Based Log Analyzer That Detects Brute-Force Attacks, Directory Traversal, And Suspicious Behavior In System Or Web Server Logs. Bβ¦β20Apr 30, 2025Updated 9 months ago
- Deathstar is an Empire plugin that automates gaining Domain and/or Enterprise Admin rights in Active Directory environments using common β¦β20Mar 24, 2025Updated 10 months ago
- β47Mar 7, 2025Updated 11 months ago
- BYOVD Technique Example using viragt64 driverβ68Jul 25, 2024Updated last year
- Scripted Local Linux Enumeration & Privilege Escalation Checksβ19Mar 26, 2019Updated 6 years ago
- ADscan is a pentesting tool focused on automating collection, enumeration and common attack paths in Active Directory. It provides an intβ¦β51Updated this week
- Scripts for OSCEβ18Dec 28, 2018Updated 7 years ago
- Subdomain Takeover lab is FREE for everyone. This means here is a legal to takeover Subdomain of this website. Here you'll find more thaβ¦β23Jan 1, 2025Updated last year
- A Burp Suite extension to add OpenAI (GPT) on Burp and help you with your Bug Bounty recon to discover endpoints, params, URLs, subdomainβ¦β886May 3, 2023Updated 2 years ago
- PowerShell Obfuscatorβ229Aug 28, 2025Updated 5 months ago
- Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist.β46Mar 4, 2024Updated last year
- βοΈ A command-line tool for IP address and URL obfuscation/de-obfuscation, providing diverse techniques for enhanced privacy and security.β27Apr 28, 2025Updated 9 months ago
- My Ubuntu 22.04 VPS general configs and scripts I use for bug bountyβ23Apr 7, 2025Updated 10 months ago
- WPAUDIT: Advanced WordPress security auditing suite & vulnerability scanner. Automates pentesting with Nmap, WPScan, Nuclei, SQLMap. Compβ¦β34May 27, 2025Updated 8 months ago
- OSINT mapping using Twitter, Ficklr, Shodan and Insecamβ23Apr 30, 2023Updated 2 years ago
- ReconPro is a specialized Google dorking tool designed for cybersecurity professionals and bug bounty hunters.β44Sep 19, 2025Updated 4 months ago
- A New Approach to Directory Bruteforce with WaybackLister v1.0β225Aug 25, 2025Updated 5 months ago
- Returns disallowed paths from robots.txt found on your target domain and snapshotted by the Wayback Machineβ28Jul 18, 2025Updated 6 months ago
- Executes shellcode from a remote server and aims to evade in-memory scannersβ32Nov 17, 2019Updated 6 years ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)β23Jan 3, 2020Updated 6 years ago
- wp-config-scanβ81Sep 6, 2023Updated 2 years ago
- Derrick is an advanced data leak scanning and CVE vulnerability analysis tool, designed for cybersecurity researchers and digital defenseβ¦β32Mar 6, 2025Updated 11 months ago
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Maβ¦β49Jul 8, 2025Updated 7 months ago
- β30Jul 8, 2020Updated 5 years ago
- β33Apr 16, 2025Updated 9 months ago
- Collection of Praetorian solutions to CTF challengesβ25Apr 20, 2018Updated 7 years ago
- β26Apr 30, 2020Updated 5 years ago
- This tool is an efficient scanner designed to detect Cache Deception vulnerabilities in web servers. It automates the process of testing β¦β34Jan 14, 2026Updated last month
- Web for Pentester Iβ10Sep 21, 2018Updated 7 years ago