NeuroSploit is an advanced, AI-powered penetration testing framework designed to automate and augment various aspects of offensive security operations. Leveraging the capabilities of large language models (LLMs).
☆1,066Mar 29, 2026Updated last month
Alternatives and similar repositories for NeuroSploit
Users that are interested in NeuroSploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Open-source offensive security platform for conducting phishing campaigns that weaponizes iCalendar automatic event processing.☆261Dec 18, 2025Updated 4 months ago
- Advanced Blue Team Security Analysis Framework powered by Multiple AI Models☆48Dec 23, 2025Updated 4 months ago
- Temodar Agent is an AI-powered WordPress plugin and theme security analysis platform built for security researchers, product security tea…☆57Updated this week
- ☆78Jan 1, 2026Updated 4 months ago
- This tool provides an interactive TUI for reviewing Nessus finding exports, running security tools (nmap, netexec, metasploit), and track…☆68Apr 24, 2026Updated last week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆47Jan 22, 2025Updated last year
- BloodHound-MCP-AI is integration that connects BloodHound with AI through Model Context Protocol, allowing security professionals to anal…☆353Jun 2, 2025Updated 11 months ago
- 安全好文整理,松鼠症患者福音☆13Nov 30, 2023Updated 2 years ago
- 🛡️ Detect and respond to security threats in real-time with God-Eye, an AI-driven tool designed for privacy and local deployment on mult…☆39Updated this week
- PentestAgent is an AI agent framework for black-box security testing, supporting bug bounty, red-team, and penetration testing workflows.☆2,177Apr 28, 2026Updated last week
- Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By f…☆329Oct 20, 2025Updated 6 months ago
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆295Mar 29, 2026Updated last month
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,075Apr 27, 2026Updated last week
- Dump Kerberos tickets☆46Aug 4, 2025Updated 9 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Docker container for running CobaltStrike 4.10☆38Sep 18, 2024Updated last year
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,367Nov 12, 2025Updated 5 months ago
- CSharp4Pentesters☆11Mar 5, 2022Updated 4 years ago
- EVA is an AI-assisted penetration testing agent that enhances offensive security workflows by providing structured attack guidance, conte…☆399Feb 24, 2026Updated 2 months ago
- Cybersecurity AI (CAI), the framework for AI Security☆8,361Apr 20, 2026Updated 2 weeks ago
- Notion C2 Profile for Mythic☆45Updated this week
- This C# tool sprays for admin access over the entire domain☆90Dec 7, 2025Updated 4 months ago
- Rust Weaponization for Red Team Engagements.☆12Nov 14, 2022Updated 3 years ago
- Static Encrypt is an crate that encrypts string literals at compile time and only decrypted at runtime when needed.☆58Jan 17, 2026Updated 3 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A deliberately vulnerable Microsoft Entra ID environment. Learn identity security through hands-on, realistic attack challenges.☆938Apr 29, 2026Updated last week
- Impacket☆50Feb 25, 2026Updated 2 months ago
- C2-agnostic BOF collection, categorized by attack chain phase. Designed to be small and modular, allowing for quick execution and automat…☆291Apr 26, 2026Updated last week
- ☆903Mar 17, 2026Updated last month
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆154Dec 26, 2025Updated 4 months ago
- Prompts for performing tests on your Kali Linux using Gemini-cli, ChatGPT, DeepSeek, CursorAI, Claude Code, and Copilot.☆236Dec 20, 2025Updated 4 months ago
- RedAudit is a next-generation Windows forensic and security assessment framework featuring a live cyber-operations GUI built for real inv…☆35Nov 15, 2025Updated 5 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆228Mar 28, 2025Updated last year
- Just a nice little shellcode loader using unconventional methods to avoid using signatured APIs☆24Jul 11, 2025Updated 9 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆154May 3, 2024Updated 2 years ago
- ☆24Sep 6, 2025Updated 8 months ago
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆30Feb 15, 2026Updated 2 months ago
- Simulate the behavior of AV/EDR for malware development training.☆567Feb 15, 2024Updated 2 years ago
- ☆149Jun 9, 2025Updated 10 months ago
- Subdomain Enumerator and Simple Crawler☆361Feb 12, 2026Updated 2 months ago
- Context-aware Nmap reconnaissance framework with traffic intelligence and AD awareness☆26Feb 4, 2026Updated 3 months ago