A state-sponsored APT framework for cyber/counter-espionage featuring AI-driven zero-click supply chain attacks, autonomous exploit deployment, quantum-resistant polymorphic encryption, reverse DoH tunneling with multi-hop proxy chains, and integrated post-exploit modules with SMS/email spoofing capabilities.
☆83Mar 3, 2026Updated 2 weeks ago
Alternatives and similar repositories for AI-Driven-Zero-Click-Exploit-Deployment-Framework
Users that are interested in AI-Driven-Zero-Click-Exploit-Deployment-Framework are comparing it to the libraries listed below
Sorting:
- Defense Intelligence Agency's Special Access Program For Cyber Intelligence, A National Security Asset | Project Red Sword Deploys an AI-…☆21Feb 11, 2025Updated last year
- Discord client zero-click RCE☆40Aug 25, 2021Updated 4 years ago
- A tool that automates fileless SSH backdoor injection—bypassing CA checks, erasing logs, creating long‑lived (up to 9999 days) passwordle…☆30Jan 30, 2026Updated last month
- Obfuscated Pegasus Spyware.☆37Apr 23, 2024Updated last year
- A sophisticated GUI tool for creating malicious RAR archives that exploit the WinRAR path traversal vulnerability (CVE-2025-8088) using A…☆26Sep 4, 2025Updated 6 months ago
- program my own pegasus spyware using python☆51Dec 5, 2021Updated 4 years ago
- Simple bash script to enumerate Linux machines☆13Nov 5, 2018Updated 7 years ago
- Here's samples of android/ios spyware named "Pegasus" made by the NSOGROUP☆211Jul 27, 2021Updated 4 years ago
- Schematics & Firmware for self-tuning portable RF Jammer☆11Feb 2, 2018Updated 8 years ago
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆15Jan 20, 2021Updated 5 years ago
- In this repositiories you will get some intresting this but this should be use for fun or kidding. This method should not be performed at…☆15Apr 27, 2023Updated 2 years ago
- LuLu is the free macOS firewall☆12Jun 28, 2022Updated 3 years ago
- A python script that finds endpoints in JavaScript files☆10Nov 29, 2019Updated 6 years ago
- Hacking Tool!! This Tools help you with ethical hacking, Social media hack, phone info, Gmail attack, phone number attack, user discovery…☆16Dec 23, 2024Updated last year
- Offensive toolkit and BloodHound graph creator for DPAPI blobs and master key files☆14Jan 10, 2026Updated 2 months ago
- Exploit app for CVE-2022-20494, a high severity permanent denial-of-service vulnerability that leverages Android's DND (Do not disturb) f…☆27Mar 3, 2023Updated 3 years ago
- Repo to storage all my favorite links☆16May 22, 2017Updated 8 years ago
- Python3 tool to perform password spraying using RDP☆17Aug 14, 2023Updated 2 years ago
- ☆16May 6, 2015Updated 10 years ago
- Library tablib to NodeJS☆11Oct 31, 2017Updated 8 years ago
- A fully public exploit of the CVE-2020-0022 BlueFrag Android RCE Vulnerability (tested on Pixel 3 XL)☆20Nov 21, 2023Updated 2 years ago
- Skeleton (but pronounced like Peloton): A Zero-Click RCE exploit for CVE-2021-0326☆20Mar 16, 2022Updated 4 years ago
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆17Jun 11, 2024Updated last year
- Python support for Flipper Zero (smaller edition)☆12Nov 20, 2024Updated last year
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆13Mar 20, 2024Updated 2 years ago
- ☆13Apr 2, 2025Updated 11 months ago
- Deceiving the Tapo app by impersonating a TP-Link device☆12Dec 11, 2023Updated 2 years ago
- Masterpiece of PineCoders script https://www.tradingview.com/script/dYqL95JB-Backtesting-Trading-Engine-PineCoders/ in v3, this is the pr…☆11Sep 20, 2022Updated 3 years ago
- Reading incoming SMS messages for verification (OTP) in Android☆13Mar 23, 2017Updated 8 years ago
- An AI tool that turns ideas into act structures into fleshed-out stories using an iterate-refine loop. Built to illustrate what's readily…☆12Aug 21, 2023Updated 2 years ago
- Instructions for using and App download.☆26Sep 24, 2025Updated 5 months ago
- SMR-Portal: an online platform for integrative analysis of GWAS and xQTL data to identify complex trait genes.☆21Dec 2, 2025Updated 3 months ago
- a simple keylogger that records hardware inputs like keyboard, mouse, microphone and webcam and sends it to your e-mail.☆14Oct 18, 2024Updated last year
- "ACCESS LIST" Bypass collections used during pentesting, gathered in one place. The list types include tools, usernames, passwords, comb…☆39Feb 19, 2026Updated last month
- xorhunx adalah tool cryptography☆11Jun 21, 2023Updated 2 years ago
- firmwalker加强版,增加了一些信息泄露关键字。☆19Mar 1, 2023Updated 3 years ago
- Butler 是一个用于自动化服务管理和任务调度的工具项目。☆16Mar 11, 2026Updated last week
- Open Web Researcher: is a cutting-edge, AI-powered alternative to tools like SearchGPT and Perplexity. It simplifies web research by refi…☆21Dec 30, 2024Updated last year
- Workflow Automation Platform. Orchestrate & Schedule code in any language, run anywhere, 500+ plugins. Alternative to Zapier, Rundeck, C…☆11Nov 1, 2024Updated last year