Autonomous Privilege Escalation using AI
☆851Nov 29, 2025Updated 3 months ago
Alternatives and similar repositories for RamiGPT
Users that are interested in RamiGPT are comparing it to the libraries listed below
Sorting:
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,049Updated this week
- A customizable and powerful penetration testing reporting platform for offensive security professionals. Simplify, customize, and automat…☆2,366Updated this week
- ☆620Feb 5, 2026Updated 3 weeks ago
- Zero shot vulnerability discovery using LLMs☆2,506Feb 6, 2025Updated last year
- BloodHound-MCP-AI is integration that connects BloodHound with AI through Model Context Protocol, allowing security professionals to anal…☆338Jun 2, 2025Updated 9 months ago
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,302Updated this week
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Oct 9, 2024Updated last year
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,205Dec 29, 2025Updated 2 months ago
- ☆159Apr 4, 2025Updated 10 months ago
- PowerShell Obfuscator☆231Aug 28, 2025Updated 6 months ago
- AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover se…☆1,475Jan 23, 2026Updated last month
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,372Updated this week
- The Network Execution Tool☆5,296Updated this week
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆130Mar 26, 2025Updated 11 months ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,314Nov 12, 2025Updated 3 months ago
- PowerShell scripts for alternative SharpHound enumeration, including users, groups, computers, and certificates, using the ActiveDirector…☆401Jan 14, 2026Updated last month
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆400Jul 23, 2025Updated 7 months ago
- A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.☆471Feb 14, 2026Updated 2 weeks ago
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆403Feb 7, 2026Updated 3 weeks ago
- game of active directory☆7,484Jul 16, 2025Updated 7 months ago
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.☆159Feb 17, 2026Updated 2 weeks ago
- An offensive data enrichment pipeline☆924Updated this week
- FBI Watchdog is an OSINT tool that monitors domain seizures and DNS record changes in real time, alerting users to law enforcement takedo…☆452May 23, 2025Updated 9 months ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆166Jul 30, 2025Updated 7 months ago
- a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )☆2,745Updated this week
- AI Red Teaming playground labs to run AI Red Teaming trainings including infrastructure.☆1,846Feb 13, 2026Updated 2 weeks ago
- ☆772May 7, 2025Updated 9 months ago
- Azure DevOps Services Attack Toolkit☆313Mar 15, 2025Updated 11 months ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆195Nov 27, 2024Updated last year
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,156Updated this week
- Bruteforce DPAPI encrypted MasterKey File from Windows Credentials Manager☆23Jan 4, 2025Updated last year
- MCP Server for Ghidra☆7,775Jun 23, 2025Updated 8 months ago
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,263Mar 19, 2025Updated 11 months ago
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆4,301Feb 15, 2026Updated 2 weeks ago
- Lab used for workshop and CTF☆501Feb 3, 2026Updated last month
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆226Apr 18, 2025Updated 10 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆150May 3, 2024Updated last year
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆814Mar 28, 2025Updated 11 months ago
- Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!☆1,303Updated this week