Red Teaming for AI and Cloud
☆208Mar 13, 2026Updated last week
Alternatives and similar repositories for woodpecker
Users that are interested in woodpecker are comparing it to the libraries listed below
Sorting:
- AISA-Scanner is an AI-powered autonomous vulnerability scanner that maps CVEs to metasploit exploits, MITRE, CEH, and SANS, delivering in…☆33Jul 31, 2025Updated 7 months ago
- A simple web app to get the latest EPSS data for a CVE ID☆12Dec 14, 2025Updated 3 months ago
- An index of publicly available and open-source threat detection rulesets.☆130Apr 17, 2025Updated 11 months ago
- Bitor Scanning Software☆456Nov 7, 2025Updated 4 months ago
- NOVA: The Prompt Pattern Matching☆121Jan 27, 2026Updated last month
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Jun 16, 2025Updated 9 months ago
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆102Jan 6, 2026Updated 2 months ago
- ☆163Nov 19, 2025Updated 4 months ago
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆42Sep 16, 2025Updated 6 months ago
- LLM-based automated patch diffing☆97Sep 15, 2025Updated 6 months ago
- A python package that helps with analysis of MSI files☆14Mar 28, 2021Updated 4 years ago
- Security tool against dependency typosquatting attacks☆55Updated this week
- Addon for BHCE☆58Apr 1, 2025Updated 11 months ago
- DigiNinja's bucket_finder utility☆17Aug 30, 2016Updated 9 years ago
- This JavaScript CLI "undeletes' packages that have been removed from the NPM registry☆29Updated this week
- AWS Trustline: Check external access on your AWS account☆129Feb 27, 2026Updated 3 weeks ago
- Rigorously evaluating autonomous systems for cybersecurity at scale☆30Jul 9, 2025Updated 8 months ago
- A collection of scripts designed to secure/harden Linux based distributions☆12Nov 2, 2025Updated 4 months ago
- Advanced Shodan-based scanner for discovering, verifying, and enumerating Model Context Protocol (MCP) servers and AI infrastructure tool…☆37Mar 12, 2026Updated last week
- Discover related domains using Whois data from whoxy.com☆15May 30, 2023Updated 2 years ago
- LudusHound is a tool for red and blue teams that transforms BloodHound data into a fully functional, Active Directory replica environment…☆364Sep 3, 2025Updated 6 months ago
- SimpleCrypt is a powerful command-line tool designed for securely encrypting and decrypting files and directories using AES-256 encryptio…☆20Nov 10, 2025Updated 4 months ago
- Create your own vulnerable by design AWS penetration testing playground☆438Feb 16, 2026Updated last month
- CISOinaBox is a free community framework to organize tools, templates, and resources to help equip new CISOs and set them up for success.…☆31Updated this week
- Python API & MCP server to find torrents programmatically☆20Mar 8, 2026Updated last week
- Personal Blog. Technology Enthusiast, CTF Player, Vulnerability Research, Reverse Engineering, Pen-Testing, and other.☆11Sep 13, 2023Updated 2 years ago
- ☆40Aug 2, 2024Updated last year
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆111May 30, 2025Updated 9 months ago
- A stager and implant that executes remote Web Assembly☆37Feb 4, 2026Updated last month
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated last year
- Jumpstart multiple WebSocket servers quickly☆32Nov 23, 2021Updated 4 years ago
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.☆159Mar 5, 2026Updated 2 weeks ago
- Python SDK Client for ZincSearch☆10Sep 21, 2022Updated 3 years ago
- Web interface to IntelMQ☆10Sep 10, 2025Updated 6 months ago
- ☆75Mar 19, 2025Updated last year
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Mar 29, 2017Updated 8 years ago
- Automation tool for Windows Deception Host Burn-In☆86Dec 4, 2024Updated last year
- Make your programs stealthier🐝☆203Jun 12, 2025Updated 9 months ago
- Application Security Mind Maps☆11Apr 10, 2021Updated 4 years ago