MCP server that connects AI assistants to HackerOne for bug bounty hunting
☆95Mar 11, 2026Updated last week
Alternatives and similar repositories for h1-brain
Users that are interested in h1-brain are comparing it to the libraries listed below
Sorting:
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆16Jul 11, 2025Updated 8 months ago
- Grafana scanner with all public CVEs that I collected in one script to make grafana testing easier☆72Feb 15, 2026Updated last month
- Automated GitHub secret scanning with smart alerting & monitoring.☆30Jan 15, 2026Updated 2 months ago
- bind your malware or reverse shell into any file (jpg - jpeg - txt - mp4 or any format ;) )☆10Mar 26, 2019Updated 6 years ago
- ☆11Sep 7, 2023Updated 2 years ago
- A Python-based tool that monitors dark web sources for mentions of specific organizations for Threat Monitoring.☆27Apr 7, 2025Updated 11 months ago
- XillenStealer V4.0 - Professional cross-platform Python stealer builder with modern UI and comprehensive features. V5.0 - t.me/XillenStea…☆54Feb 23, 2026Updated 3 weeks ago
- Celery plugin to autoscale based on available CPU, memory, or other system attributes.☆11Dec 8, 2017Updated 8 years ago
- Qiling Framework Documentation☆18Mar 9, 2025Updated last year
- CyberStrikeAI is an AI-native security testing platform built in Go. It integrates 100+ security tools, an intelligent orchestration engi…☆36Mar 10, 2026Updated last week
- Extract domain from SSL Information☆15Nov 23, 2021Updated 4 years ago
- An simple crypter made with Xanthorox AI for Testing v5 pro capabilities☆40Feb 11, 2026Updated last month
- ClickForClickOnce - Generate configurable clickonce payloads☆91Oct 10, 2025Updated 5 months ago
- A formula to calculate bounty amounts.☆15Dec 2, 2017Updated 8 years ago
- ☆16Oct 18, 2024Updated last year
- A Beacon Object File (BOF) that performs the complete ESC1 attack chain in a single execution: certificate request with arbitrary SAN (+S…☆116Dec 21, 2025Updated 2 months ago
- MacOS Stealer written in Rust. For Legal and Ethical Research Purposes Only.☆25Jan 3, 2025Updated last year
- ☆77Feb 12, 2026Updated last month
- ☆31Jan 31, 2026Updated last month
- 🛡️ The Ultimate Cybersecurity Library | 160+ curated books, guides & resources covering Ethical Hacking, Penetration Testing, Bug Bounty…☆46Mar 5, 2026Updated 2 weeks ago
- 🤹 Caido AI Skills☆54Mar 13, 2026Updated last week
- ☆18Apr 7, 2022Updated 3 years ago
- Cobalt Strike module x loader x profile x wike / A public collection of open resources for Cobalt Strike (only legal use in Red Team and …☆114Mar 6, 2026Updated 2 weeks ago
- A web application dedicated to write sysmon configuration file☆13Oct 23, 2025Updated 4 months ago
- A Windows 11 Rootkit. (Exploit has been patched)☆16Sep 7, 2025Updated 6 months ago
- 000☆16Mar 30, 2022Updated 3 years ago
- Adobe Experience Manager (AEM) hacking toolkit☆108Sep 26, 2025Updated 5 months ago
- Practical setup guides and helpers to connect Burp Suite MCP Server to multiple AI backends (Codex, Gemini, Ollama, ...).☆200Jan 19, 2026Updated 2 months ago
- Groovy Post Exploitation☆20Oct 21, 2024Updated last year
- Bài tập lớn IT3180 - Nhập môn Công nghệ phần mềm - Chủ đề Quản lý thu phí đóng góp của Tổ dân phố☆12Jan 12, 2024Updated 2 years ago
- Use AI to install penetration testing tool suites in one click.☆70Oct 5, 2025Updated 5 months ago
- A curated list of Security Big4 papers for Privacy, Mobile Security and Access Control.☆15Oct 8, 2024Updated last year
- ☆10Sep 24, 2023Updated 2 years ago
- Scripts that automate portions of pentests.☆58Mar 4, 2026Updated 2 weeks ago
- MCP for Pwn☆232Mar 12, 2026Updated last week
- The OWASP Testing Guide v4.2 Checlist [2023]☆13Jan 15, 2023Updated 3 years ago
- A Proof-of-Concept using Cache Smuggling + Exif data to passively download a second stage payload☆51Oct 28, 2025Updated 4 months ago
- ☆76Jan 1, 2026Updated 2 months ago
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆65Jan 5, 2026Updated 2 months ago