NeuroSploit is an advanced, AI-powered penetration testing framework designed to automate and augment various aspects of offensive security operations. Leveraging the capabilities of large language models (LLMs).
☆951Mar 16, 2026Updated this week
Alternatives and similar repositories for NeuroSploit
Users that are interested in NeuroSploit are comparing it to the libraries listed below
Sorting:
- Open-source offensive security platform for conducting phishing campaigns that weaponizes iCalendar automatic event processing.☆238Dec 18, 2025Updated 3 months ago
- Advanced Blue Team Security Analysis Framework powered by Multiple AI Models☆48Dec 23, 2025Updated 2 months ago
- This tool provides an interactive TUI for reviewing Nessus finding exports, running security tools (nmap, netexec, metasploit), and track…☆65Feb 5, 2026Updated last month
- BloodHound-MCP-AI is integration that connects BloodHound with AI through Model Context Protocol, allowing security professionals to anal…☆343Jun 2, 2025Updated 9 months ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆47Jan 22, 2025Updated last year
- PentestAgent is an AI agent framework for black-box security testing, supporting bug bounty, red-team, and penetration testing workflows.☆1,744Mar 8, 2026Updated last week
- 🛡️ Detect and respond to security threats in real-time with God-Eye, an AI-driven tool designed for privacy and local deployment on mult…☆40Updated this week
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆288Jan 12, 2026Updated 2 months ago
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,060Mar 10, 2026Updated last week
- Docker container for running CobaltStrike 4.10☆38Sep 18, 2024Updated last year
- EVA is an AI-assisted penetration testing agent that enhances offensive security workflows by providing structured attack guidance, conte…☆387Feb 24, 2026Updated 3 weeks ago
- CSharp4Pentesters☆11Mar 5, 2022Updated 4 years ago
- This C# tool sprays for admin access over the entire domain☆90Dec 7, 2025Updated 3 months ago
- Notion C2 Profile for Mythic☆35Mar 3, 2026Updated 2 weeks ago
- Rust Weaponization for Red Team Engagements.☆12Nov 14, 2022Updated 3 years ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,325Nov 12, 2025Updated 4 months ago
- Cybersecurity AI (CAI), the framework for AI Security☆7,417Jan 30, 2026Updated last month
- Collection of BOFs created for red team/adversary emulation engagements. Created to be small and interchangeable, for quick recon or even…☆265Mar 11, 2026Updated last week
- Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By f…☆326Oct 20, 2025Updated 5 months ago
- Impacket☆50Feb 25, 2026Updated 3 weeks ago
- WP-Hunter is a WordPress plugin/theme reconnaissance and static analysis (SAST) tool. It is designed for security researchers to evaluate…☆43Feb 27, 2026Updated 3 weeks ago
- ☆895Updated this week
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆154Dec 26, 2025Updated 2 months ago
- Prompts for performing tests on your Kali Linux using Gemini-cli, ChatGPT, DeepSeek, CursorAI, Claude Code, and Copilot.☆224Dec 20, 2025Updated 3 months ago
- A BloodHound OpenGraph collector that models Windows local privilege escalation as interconnected attack paths.☆365Mar 6, 2026Updated 2 weeks ago
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆29Feb 15, 2026Updated last month
- RedAudit is a next-generation Windows forensic and security assessment framework featuring a live cyber-operations GUI built for real inv…☆35Nov 15, 2025Updated 4 months ago
- ☆20Sep 6, 2025Updated 6 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆150May 3, 2024Updated last year
- Mythic C2 CheatSheet for OSEP☆62Jan 21, 2026Updated last month
- Subdomain Enumerator and Simple Crawler☆354Feb 12, 2026Updated last month
- 安全好文整理,松鼠症患者福音☆13Nov 30, 2023Updated 2 years ago
- MCP Server Security Standard (MSSS): an open, testable security control standard for certifying MCP servers, with levels, evidence requir…☆69Mar 12, 2026Updated last week
- ☆147Jun 9, 2025Updated 9 months ago
- A deliberately vulnerable Microsoft Entra ID environment. Learn identity security through hands-on, realistic attack challenges.☆912Jan 15, 2026Updated 2 months ago
- Baseline a Windows System against LOLBAS☆72Feb 2, 2026Updated last month
- Context-aware Nmap reconnaissance framework with traffic intelligence and AD awareness☆26Feb 4, 2026Updated last month
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- Laravel RCE Exploitation Toolkit☆56Nov 8, 2025Updated 4 months ago