A state-sponsored APT framework for cyber/counter-espionage featuring AI-driven zero-click supply chain attacks, autonomous exploit deployment, quantum-resistant polymorphic encryption, reverse DoH tunneling with multi-hop proxy chains, and integrated post-exploit modules with SMS/email spoofing capabilities.
☆78Feb 21, 2026Updated last week
Alternatives and similar repositories for AI-Driven-Zero-Click-Exploit-Deployment-Framework
Users that are interested in AI-Driven-Zero-Click-Exploit-Deployment-Framework are comparing it to the libraries listed below
Sorting:
- This project provides a web interface to send a payload via SMS, display device information upon successful delivery, and control the dev…☆19Feb 20, 2026Updated last week
- Defense Intelligence Agency's Special Access Program For Cyber Intelligence, A National Security Asset | Project Red Sword Deploys an AI-…☆20Feb 11, 2025Updated last year
- Discord client zero-click RCE☆40Aug 25, 2021Updated 4 years ago
- Obfuscated Pegasus Spyware.☆36Apr 23, 2024Updated last year
- Quantum zero-day exploit Hunting for vulnerabilities as small as a quantum particle☆13Jun 13, 2025Updated 8 months ago
- Final assignment for the course Data Visualization with Python, part of IBM Data Science Professional Certification on Coursera☆11Jun 22, 2020Updated 5 years ago
- Secure and performant OCI-image builder for Kubernetes☆12Updated this week
- Hacking Tool!! This Tools help you with ethical hacking, Social media hack, phone info, Gmail attack, phone number attack, user discovery…☆16Dec 23, 2024Updated last year
- ☆37Oct 3, 2023Updated 2 years ago
- ☆44Feb 10, 2026Updated 2 weeks ago
- Code repository for "Machine Learning For Red Team Hackers".☆41Feb 5, 2020Updated 6 years ago
- Opensource Telegram (Osint) Tool☆21Jan 3, 2025Updated last year
- Python support for Flipper Zero (smaller edition)☆12Nov 20, 2024Updated last year
- Asset inventory of over 800 public bug bounty programs.☆12Jun 12, 2023Updated 2 years ago
- It is a ML based project developed in python language. It detect and recognize the face and mark attendance of that person. It's good poi…☆10Aug 13, 2023Updated 2 years ago
- ☆14May 14, 2022Updated 3 years ago
- Hack The Box OSCP-like VMs writeups☆11Oct 11, 2020Updated 5 years ago
- Instructions for using and App download.☆25Sep 24, 2025Updated 5 months ago
- ROBLOX Script - Collection of visuals / wall hacks (Tracers, ESP, Boxes (2D & 3D), Head Dots & Crosshair)☆15Feb 16, 2023Updated 3 years ago
- Schematics & Firmware for self-tuning portable RF Jammer☆11Feb 2, 2018Updated 8 years ago
- ECED440 Computer Security☆11Nov 6, 2024Updated last year
- The SDK assets for the XRTK☆10Sep 16, 2022Updated 3 years ago
- bug bounty☆11Aug 13, 2023Updated 2 years ago
- Attack Active Directory Trusts with a single tool☆14Jan 15, 2025Updated last year
- WP Juicer Tool for quick scanning of confidential information on WordPress endpoints.