KawaiiGPT — Open-source LLM gateway accessing DeepSeek, Gemini, and Kimi-K2 through reverse-engineered Pollinations API with no API keys required, built-in prompt injection capabilities for security research, Termux/Linux native support, and Rich console interface
☆816Mar 13, 2026Updated last week
Alternatives and similar repositories for KawaiiGPT
Users that are interested in KawaiiGPT are comparing it to the libraries listed below
Sorting:
- AutoStaking BOT — Automated crypto staking bot for Pharos network with multi-account support, proxy rotation (HTTP/SOCKS5), MockUSD fauce…☆48Mar 13, 2026Updated last week
- Somnia Auto — Automation bot for Somnia Network EVM-compatible blockchain testnet with faucet claiming, token transfers, smart contract d…☆80Mar 13, 2026Updated last week
- gnark-crypto-cmd — Interactive CLI for Consensys gnark-crypto library featuring elliptic curve cryptography (BN254, BLS12-381, BLS24, BW6…☆543Mar 13, 2026Updated last week
- BeraChainTools — Interactive toolkit for Berachain Artio Testnet featuring BEX DEX swaps, Honey stablecoin mint/redeem, Bend lending, Ber…☆542Mar 13, 2026Updated last week
- Python Bitcoin Utils CLI — Interactive interface for python-bitcoin-utils library with low-level Bitcoin tools for key generation, addres…☆223Mar 13, 2026Updated last week
- Source Code Management Attack Toolkit☆13Aug 1, 2022Updated 3 years ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆15Feb 13, 2024Updated 2 years ago
- Local File Inclusion (LFI) in FHEM 6.0 allows an attacker to include a file, it can lead to sensitive information disclosure.☆12Jan 20, 2021Updated 5 years ago
- ☆16Jan 18, 2020Updated 6 years ago
- 👽 Exploits written for research purposes.☆11Nov 15, 2021Updated 4 years ago
- Python scripts to audit and harden the 2014-2017 Microsoft SQL Server☆10Jun 5, 2020Updated 5 years ago
- IoTVulBench is an open-source benchmark dataset for IoT security research, containing firmware-related vulnerabilities and the correspond…☆18Dec 30, 2024Updated last year
- Basic XSS Scanner☆11Jan 21, 2021Updated 5 years ago
- ☆12Oct 2, 2022Updated 3 years ago
- Analyze and Visualize Data from Modern Honey Network Servers with R☆15Jan 15, 2016Updated 10 years ago
- Backend for Nuclear Pond☆21Dec 7, 2023Updated 2 years ago
- Treck Network Stack Discovery Tool [Ripple20]☆12Jul 1, 2020Updated 5 years ago
- Somewhat Reliable PoC Exploit for CVE-2022-36804 (BitBucket Critical Command Injection)☆16Nov 23, 2023Updated 2 years ago
- Automating SQL Injection in a list of URLs or Request Files☆13Aug 8, 2016Updated 9 years ago
- A PoC of CVE-2025-24071 / CVE-2025-24054, A windows vulnerability that allow get NTMLv2 hashes☆25May 15, 2025Updated 10 months ago
- Small tool to scan On-Premises Exchange servers, useful for analytical purposes and patch management☆20Aug 28, 2022Updated 3 years ago
- Get all NetNTLM Hashes via Different zero-click Methodologies from LLMNR Poisoning☆18Mar 16, 2022Updated 4 years ago
- ☆20Dec 7, 2021Updated 4 years ago
- Bake shellcode to get malicious.exe☆27Jul 25, 2023Updated 2 years ago
- Offensive Security Wireless Professional☆17Mar 14, 2020Updated 6 years ago
- Low budget VirusTotal Intelligence Cosplay☆20Jan 6, 2022Updated 4 years ago
- A steganography based shellcode hider to bypass AV☆17Aug 7, 2022Updated 3 years ago
- Site fast fuzzing with chorme extension.☆24Feb 4, 2022Updated 4 years ago
- ☆28Jan 9, 2023Updated 3 years ago
- cve-2020-0688 UNIVERSAL Python implementation utilizing ASPX webshell for command output☆24Sep 12, 2023Updated 2 years ago
- Practice Questions for the Linux Foundation Certified System-Administrator (LFCS) exam☆11Dec 3, 2019Updated 6 years ago
- ICS/SCADA nmap script.☆18May 17, 2018Updated 7 years ago
- A collection of Awesome Frida Scripts for MAPT☆20Jan 7, 2023Updated 3 years ago
- Cloudflare Bypass tools | PentestCore☆16Mar 24, 2020Updated 5 years ago
- Very basic dll injector written in zig, for windows. Assumes the injector, target process, and dll are of the same bitness. Usage: ./inje…☆29Jun 9, 2020Updated 5 years ago
- ☆29Oct 18, 2022Updated 3 years ago
- Bugbounty utility to store list of enumerated subdomains into an sqlite3 db [one liner style / Pipe and save]☆29Jan 6, 2021Updated 5 years ago
- a burp extension for dynamic payload generation to detect injection flaws (RCE, LFI, SQLi), creates access matrix based user sessions to …☆30Oct 21, 2025Updated 5 months ago
- Red AI Archive: Jeff Sims - A curated collection of work in AI safety, cybersecurity data science, and AI red teaming – my own research a…☆26Apr 1, 2025Updated 11 months ago