Red Teaming for AI and Cloud
☆208Mar 13, 2026Updated 2 months ago
Alternatives and similar repositories for woodpecker
Users that are interested in woodpecker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Bitor Scanning Software☆462Nov 7, 2025Updated 6 months ago
- NOVA: The Prompt Pattern Matching☆133May 1, 2026Updated 3 weeks ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Jun 16, 2025Updated 11 months ago
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆102May 1, 2026Updated 2 weeks ago
- ☆165Mar 20, 2026Updated 2 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- LLM-based automated patch diffing☆99Sep 15, 2025Updated 8 months ago
- A python package that helps with analysis of MSI files☆14Mar 28, 2021Updated 5 years ago
- Security tool against dependency typosquatting attacks☆56May 13, 2026Updated last week
- Addon for BHCE☆57Apr 1, 2025Updated last year
- DigiNinja's bucket_finder utility☆17Aug 30, 2016Updated 9 years ago
- This JavaScript CLI "undeletes' packages that have been removed from the NPM registry☆31Apr 29, 2026Updated 3 weeks ago
- AWS Trustline: Check external access on your AWS account☆128Feb 27, 2026Updated 2 months ago
- Rigorously evaluating autonomous systems for cybersecurity at scale☆31Jul 9, 2025Updated 10 months ago
- Web Server Vulnerability Scanning Tool☆37Mar 11, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- LudusHound is a tool for red and blue teams that transforms BloodHound data into a fully functional, Active Directory replica environment…☆371Sep 3, 2025Updated 8 months ago
- SimpleCrypt is a powerful command-line tool designed for securely encrypting and decrypting files and directories using AES-256 encryptio…☆20Mar 22, 2026Updated 2 months ago
- ☆20Feb 20, 2026Updated 3 months ago
- Advanced Shodan-based scanner for discovering, verifying, and enumerating Model Context Protocol (MCP) servers and AI infrastructure tool…☆46May 14, 2026Updated last week
- Create your own vulnerable by design AWS penetration testing playground☆446May 1, 2026Updated 2 weeks ago
- IDA helper plugin to reverse engineer Objective-C code☆45Jun 12, 2025Updated 11 months ago
- ☆39Aug 2, 2024Updated last year
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- Jumpstart multiple WebSocket servers quickly☆33Nov 23, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆113May 30, 2025Updated 11 months ago
- An OpenAI API Compatible Honeypot Gateway☆22Mar 17, 2025Updated last year
- ☆74Mar 19, 2025Updated last year
- Python API & MCP server to find torrents programmatically☆23Apr 30, 2026Updated 3 weeks ago
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Mar 29, 2017Updated 9 years ago
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.☆172Mar 5, 2026Updated 2 months ago
- Make your programs stealthier🐝☆204Jun 12, 2025Updated 11 months ago
- Automation tool for Windows Deception Host Burn-In☆85Dec 4, 2024Updated last year
- Web interface to IntelMQ☆10Apr 28, 2026Updated 3 weeks ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆121Jan 30, 2026Updated 3 months ago
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆36Oct 17, 2024Updated last year
- Damn Vulnerable SCA Application☆44Mar 30, 2026Updated last month
- A security tool that detects malicious packages from external vulnerability feeds and searches for them in your package registries or art…☆69Nov 27, 2025Updated 5 months ago
- Active Directory share enumeration tool☆12Apr 28, 2025Updated last year
- Url scrapper or extractor from alienvault☆39Mar 1, 2025Updated last year
- Python script to create CSV, HTML & PDF filtered for repo tags☆13Jul 26, 2024Updated last year