☆24Jan 31, 2024Updated 2 years ago
Alternatives and similar repositories for ExploitGPT
Users that are interested in ExploitGPT are comparing it to the libraries listed below
Sorting:
- Config files for my GitHub profile.☆21Nov 13, 2025Updated 3 months ago
- Integrate static security testing with HCL AppScan on Cloud using GitHub Actions☆11Feb 20, 2026Updated last week
- A framework for interacting with HCL AppScan on Cloud and HCL AppScan Enterprise☆12Mar 3, 2023Updated 2 years ago
- A powerful hardware ID spoofing tool designed to modify system identifiers for privacy and security purposes. Change MAC addresses, HWID,…☆21Nov 26, 2025Updated 3 months ago
- how to hack pattern lock☆15Dec 27, 2020Updated 5 years ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11May 10, 2025Updated 9 months ago
- ☆19Nov 5, 2025Updated 3 months ago
- VPN & IP Changer☆10Aug 6, 2024Updated last year
- Pimp my Kali but for lazy AFKers☆12Jun 18, 2023Updated 2 years ago
- A python script file to decrypt encrypted IEE (802.11) Radio .pcap files captured via Wireshark for extraction and analyse.☆10Sep 8, 2019Updated 6 years ago
- the famous wireless network detector, sniffer, and intrusion detection system☆16Nov 28, 2012Updated 13 years ago
- This cookbook installs Nexpose☆13Dec 15, 2023Updated 2 years ago
- Hey there! Welcome to my collection of bug bounty and security testing resources. Whether you're just starting out or already deep into y…☆11Dec 25, 2025Updated 2 months ago
- Hijacker for Linux Phones☆17Jul 16, 2025Updated 7 months ago
- Master Kali Linux, Excel in Offensive Security☆32Jun 15, 2025Updated 8 months ago
- repository to hold prebuilt kali nethunter kernel☆17Nov 22, 2021Updated 4 years ago
- Alynx Nethunter kernel for sunfish pixel 4a☆14Feb 5, 2025Updated last year
- MCP for Ansible, Terraform, LocalStack, and other IaC tools. Create and iterate IaC☆25Feb 19, 2026Updated last week
- Cyber stalker is a web application based tool to catch fake account users online☆19May 6, 2023Updated 2 years ago
- Created by Denis Podgurskiy via the GitHub Connector☆13May 20, 2021Updated 4 years ago
- Docker image for building an NGINX server with Okta for authentication (OIDC)☆18Mar 26, 2019Updated 6 years ago
- 🛡️ Advanced WiFi penetration testing tool with automated vulnerability detection and AI-powered PIN prediction. Features auto-attack mod…☆38Sep 9, 2025Updated 5 months ago
- ☆14Jul 13, 2022Updated 3 years ago
- Facilitates the indexing of content from a CSV into ElasticSearch☆27Oct 3, 2013Updated 12 years ago
- the main target of that project is to build a powerful and highly flexible android universal boot loader. with "universal" i mean that it…☆34Nov 4, 2013Updated 12 years ago
- An all-in-one Lsposed module to spoof all things networking (including eSIM compatibility)!☆36Jan 11, 2026Updated last month
- Nessus is one of the many vulnerability scanners used during vulnerability assessments☆19Aug 25, 2023Updated 2 years ago
- ☆16Oct 12, 2017Updated 8 years ago
- Response Filter Denial of Service (RFDoS) Experimental Scanner☆16Nov 10, 2024Updated last year
- Moded Magisk for perfect use on ANDRAX☆17Dec 6, 2018Updated 7 years ago
- ☆30Mar 20, 2013Updated 12 years ago
- ADB Unlocker: Android tool using ADB for device management. Unlock, reset PIN, bypass FRP, enable USB debugging. Use responsibly.☆37Mar 30, 2025Updated 11 months ago
- Herramienta de BugBounty atutomatizada☆42Nov 5, 2025Updated 3 months ago
- Remote Sniffer: Tool for sending sniffered PCAP traffic in realtime into Winows/PC box with GUI Wireshark☆14Jul 9, 2020Updated 5 years ago
- Install PowerShell on Termux☆20Jan 22, 2023Updated 3 years ago
- ☆17Aug 18, 2022Updated 3 years ago
- Wazuh decoder for mikrotik logs and monitoring login/logout wireguard peers☆34Jun 19, 2024Updated last year
- Ideas for what to get in advance of the arrival of your new Troodon 3D printer, or for anyone with a 3D printer that wants some ideas abo…☆21Feb 23, 2025Updated last year
- Homemade WiFi Pineapple for under $50☆29Oct 4, 2024Updated last year