GH05TCREW / PentestAgentLinks
All-in-one offensive security toolbox with AI agent and MCP architecture. Integrates tools like Nmap, Metasploit, FFUF, SQLMap. Enables pentesting, bug bounty hunting, threat hunting, and reporting. RAG-based responses with local knowledge base support.
☆394Updated 3 months ago
Alternatives and similar repositories for PentestAgent
Users that are interested in PentestAgent are comparing it to the libraries listed below
Sorting:
- NOT for educational purposes: An MCP server for professional penetration testers including STDIO/HTTP/SSE support, nmap, go/dirbuster, ni…☆86Updated 2 months ago
- MCP Server for Metasploit☆266Updated last month
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆349Updated 3 weeks ago
- jshunter is a command-line tool designed for analyzing JavaScript files and extracting endpoints. This tool specializes in identifying se…☆386Updated this week
- Automated red-team toolkit for stress-testing LLM defences - Vector Attacks on LLMs (Gendalf Case Study)☆99Updated last month
- Penetration Testing AI Assistant based on open source LLMs.☆98Updated 5 months ago
- MCP for Security: A collection of Model Context Protocol servers for popular security tools like SQLMap, FFUF, NMAP, Masscan and more. In…☆388Updated this week
- MCP configuration to connect AI agent to a Linux machine.☆170Updated last month
- MCP Server for Burp☆279Updated 2 months ago
- 🤖 LLM-powered agent for automated Google Dorking in bug hunting & pentesting.☆65Updated last month
- Automated web vulnerability scanning with LLM agents☆353Updated 3 months ago
- A high-speed tool for passively gathering URLs, optimized for efficient and comprehensive web asset discovery without active scanning.☆710Updated 3 weeks ago
- ☆236Updated last year
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆121Updated 4 months ago
- GBounty is a multi-step website vulnerability scanner developed in Golang designed to help companies, pentesters, and bug hunters identif…☆146Updated 3 weeks ago
- A curated list of tools officially presented at Black Hat events☆677Updated 2 months ago
- Automation tool to testing and confirm the xss vulnerability.☆289Updated 2 months ago
- ☆88Updated 6 months ago
- BrowserBruter is a powerful web form fuzzing automation tool designed for web security professionals and penetration testers. This Python…☆323Updated last week
- BurpSuite MCP Server: A powerful Model Context Protocol (MCP) server implementation for BurpSuite, providing programmatic access to Burp…☆52Updated 4 months ago
- The IoT security toolkit to help identify IoT related dashboards and scan them for default passwords and vulnerabilities.☆193Updated 9 months ago
- A lightweight GPT model, trained to discover subdomains.☆290Updated 2 weeks ago
- Bypass-Four03 is a powerful bash tool designed to help testers bypass HTTP 403 forbidden errors through various path and header manipulat…☆151Updated 3 months ago
- Super Weird XSS Payloads☆117Updated last week
- JWT Auditor – Analyze, break, and understand your tokens like a pro.☆283Updated last month
- Using Agents To Automate Pentesting☆297Updated 8 months ago
- ☆98Updated 4 months ago
- Latest CVEs with their Proof of Concept exploits.☆131Updated this week
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆234Updated last year
- LazyHunter is an automated reconnaissance tool designed for bug hunters, leveraging Shodan's InternetDB and CVEDB APIs☆217Updated 5 months ago