HacktronAI / skillsLinks
This repository consists of extensions, that hacktron uses to execute specific workflows in CLI.
☆59Updated this week
Alternatives and similar repositories for skills
Users that are interested in skills are comparing it to the libraries listed below
Sorting:
- NeuroSploitv2 is an advanced, AI-powered penetration testing framework designed to automate and augment various aspects of offensive secu…☆211Updated last week
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆39Updated 8 months ago
- Burp Suite extension for bypassing client-side encryption for pentesting and bug bounty in WebSocket☆83Updated 3 months ago
- The most complete code auditing platform with thousands of real-world challenges☆134Updated 6 months ago
- Automated red-team toolkit for stress-testing LLM defences - Vector Attacks on LLMs (Gendalf Case Study)☆107Updated 4 months ago
- AI-powered subdomain enumeration tool with local LLM analysis via Ollama - 100% private, zero API costs☆182Updated last month
- EVA is an AI-assisted penetration testing agent that enhances offensive security workflows by providing structured attack guidance, conte…☆236Updated this week
- AI / LLM Red Team Field Manual & Consultant’s Handbook☆216Updated this week
- 🤖 The Modern, Blazing Fast Port Scanner 🤖☆28Updated 11 months ago
- Proof Of Concepts☆55Updated 5 months ago
- CVE-2025-3248 Langflow RCE Exploit☆16Updated 6 months ago
- Just A list Of Some Multilingual XSS Payloads and other weird ones i made☆122Updated 3 months ago
- HTML Universal Identifier☆65Updated last year
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆206Updated 3 months ago
- ☆163Updated 2 weeks ago
- Red Team tools containerized☆74Updated 3 weeks ago
- Generate backdoored RSA keys using SETUP☆222Updated 3 weeks ago
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆87Updated last year
- Nuclei templates for source code analysis. Detects hardcoded secrets, config leaks, debug endpoints. Also helps identify OWASP Top 10 iss…☆82Updated 6 months ago
- An archive of 0day.today exploits☆321Updated 5 months ago
- Rust-powered HTTP Request Smuggling Scanner.☆56Updated this week
- ☆87Updated 9 months ago
- Protection against HTML smuggling attacks.☆100Updated 5 months ago
- ☆186Updated last month
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.☆157Updated 3 weeks ago
- A penetration testing tool for odoo applications.☆68Updated 3 months ago
- Abuse trust-boundaries to bypass firewalls and network controls☆385Updated 5 months ago
- one-for-all llm powered, passive & active subdomain enumeration tool☆88Updated last month
- CVE-2025-5777 Citrix NetScaler Memory Leak Exploit (CitrixBleed 2)☆30Updated 5 months ago
- Ebyte-Go-Morpher is a Go program that parses, analyzes, and rewrites Go source code to apply multiple layers of obfuscation. It operates …☆120Updated 5 months ago