Sploit -- All-in-one, AI-powered cybersecurity toolkit for web, network, and phishing tests. Modular, cross-platform, Docker-ready, with GUI & CLI. Open source by AUX-441 Team.
☆32Aug 29, 2025Updated 6 months ago
Alternatives and similar repositories for SecuSploitX
Users that are interested in SecuSploitX are comparing it to the libraries listed below
Sorting:
- This tool was created to address a common blind spot in corporate security: chat platforms. During penetration tests and red team engage…☆53Dec 21, 2025Updated 3 months ago
- Ce descriptif couvre : 🏗️ Infrastructure : Terraform + GCP 🔒 Sécurité : VPC privé 🌐 Réseau : Gateway GCP, firewall 🎯 Composants : Obs…☆38Oct 21, 2025Updated 5 months ago
- ☆13Jan 5, 2026Updated 2 months ago
- Derrick is an advanced data leak scanning and CVE vulnerability analysis tool, designed for cybersecurity researchers and digital defense…☆32Mar 6, 2025Updated last year
- ☆13Dec 15, 2024Updated last year
- ☆36Mar 28, 2025Updated 11 months ago
- Interactive simulation of a fictional ransomware group's dashboard☆12Sep 30, 2024Updated last year
- MODBUS Penetration Testing Framework☆12Jul 2, 2017Updated 8 years ago
- ☆11Jan 26, 2026Updated last month
- Windows Defender Manager is a tool that helps stop Windows Defender. It works with the Antimalware Service Executable of all versions of …☆41Jan 18, 2025Updated last year
- Data-Shield IPv4 Blocklist Community provides an official, curated registry of IPv4 addresses identified as malicious. Updated continuous…☆443Updated this week
- OSINT web scraper for SatNow to extract details about satellite components and subsystem specs for in-depth reconnaissance 🛸☆68Nov 23, 2024Updated last year
- Network labs☆27Apr 27, 2025Updated 10 months ago
- Formation en français pour maîtriser le langage C sur Ubuntu/Linux - De la syntaxe à la programmation système, avec outillage DevOps mode…☆58Feb 16, 2026Updated last month
- A minimalist dotfiles manager using Nix☆20May 28, 2025Updated 9 months ago
- Human Oversight for Autonomous AI Agents using Azure Logic Apps + Python☆21Feb 20, 2026Updated last month
- An Encrypted File transfer via AES-256-CBC☆53Apr 14, 2021Updated 4 years ago
- Read & Paste the whole clipboard , count chars , with enhanced visual feedback☆35Jul 19, 2025Updated 8 months ago
- A comprehensive Windows security auditing and threat detection toolkit. Features 58 production-ready PowerShell functions organized into …☆76Oct 20, 2025Updated 5 months ago
- GitHub Action that generates and commits a live SVG world map of cyber threats using Shodan data.☆25Updated this week
- This is a public repository to help those trying to learn Azure content and certifications to better understand the concepts and have a c…☆32Sep 28, 2023Updated 2 years ago
- ☆16Feb 2, 2026Updated last month
- References, tools and sample payloads☆11Sep 16, 2016Updated 9 years ago
- This is the public repo for the course HMMA238 'Software Development'☆11Apr 20, 2021Updated 4 years ago
- Generate an enhanced VCF files from ClinVar XML Full releases☆15Feb 23, 2026Updated 3 weeks ago
- wp-config-scan☆81Sep 6, 2023Updated 2 years ago
- Docker multi-stage build for nixos.☆19Mar 5, 2026Updated 2 weeks ago
- Optimized Qwen3-Embedding-0.6B setup with Ollama, FastAPI wrapper, and Qdrant Compatible with Roo and Kilo Code Codebase Indexing☆38Jul 4, 2025Updated 8 months ago
- Payload Generation Workflow☆40Jul 18, 2025Updated 8 months ago
- 🔍 PANO: Advanced OSINT investigation platform combining graph visualization, timeline analysis, and AI assistance to uncover hidden conn…☆423Feb 13, 2026Updated last month
- A list of notes that I've compiled over time to help with CTF's and the OSCP exam.☆10Dec 29, 2020Updated 5 years ago
- Training and certifications related to secure software development☆11Feb 9, 2026Updated last month
- Lazy Bloodhound is a toy PHP static code analyzer built on tree-sitter☆13Feb 19, 2021Updated 5 years ago
- A minimal set of iptables rules to accept only HTTPS and SSH as input☆10May 31, 2015Updated 10 years ago
- My NixOS Dotfiles☆20Nov 29, 2025Updated 3 months ago
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Dec 3, 2025Updated 3 months ago
- Shellcode Loader Utilizing ETW Events☆66Feb 26, 2025Updated last year
- Discover and monitor internet assets using favicon hashes across search engines.☆247Oct 11, 2025Updated 5 months ago
- Active Directory Mindmap Recipes: A Compromise à la Carte☆151Sep 4, 2025Updated 6 months ago