A state-sponsored APT framework for cyber/counter-espionage featuring AI-driven zero-click supply chain attacks, autonomous exploit deployment, quantum-resistant polymorphic encryption, reverse DoH tunneling with multi-hop proxy chains, and integrated post-exploit modules with SMS/email spoofing capabilities.
☆103Apr 21, 2026Updated last month
Alternatives and similar repositories for AI-Driven-Zero-Click-Exploit-Deployment-Framework
Users that are interested in AI-Driven-Zero-Click-Exploit-Deployment-Framework are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Defense Intelligence Agency's Special Access Program For Cyber Intelligence, A National Security Asset | Project Red Sword Deploys an AI-…☆23Feb 11, 2025Updated last year
- Voice Cloning, Voice Call, and Text-to-Speech platform. Perfect for content creators, developers, and storytellers 😉☆20Updated this week
- bot net ufonet con ia☆12Jul 7, 2024Updated last year
- [Pentesting] A Python-based program for Time-based/Blind Remote Code Execution (RCE). The main objective of this program is to extract th…☆19Oct 22, 2024Updated last year
- Obfuscated Pegasus Spyware.☆41Apr 23, 2024Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A sophisticated GUI tool for creating malicious RAR archives that exploit the WinRAR path traversal vulnerability (CVE-2025-8088) using A…☆31Sep 4, 2025Updated 8 months ago
- program my own pegasus spyware using python☆55Dec 5, 2021Updated 4 years ago
- RatChatPT☆16Jun 9, 2023Updated 2 years ago
- Quantum zero-day exploit Hunting for vulnerabilities as small as a quantum particle☆13Jun 13, 2025Updated 11 months ago
- email receipts templates stockx, goat, bape.. ect☆17Jun 17, 2024Updated last year
- Scripts and outputs for ATLAS data in STIX JSON and ATT&CK Navigator layer formats☆31Apr 30, 2026Updated 2 weeks ago
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆15Jan 20, 2021Updated 5 years ago
- ⚙️ A ready-to-use template for creating interactive batch scripts.☆14Mar 12, 2025Updated last year
- Command-line tool to search for malware samples in various repositories☆13Mar 3, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- LuLu is the free macOS firewall☆12Jun 28, 2022Updated 3 years ago
- Proof-of-Concept for Authorization Bypass in Next.js Middleware☆19Mar 23, 2025Updated last year
- A python script that finds endpoints in JavaScript files☆10Nov 29, 2019Updated 6 years ago
- A full-fledged msfrpc library for Metasploit framework.☆13Aug 5, 2017Updated 8 years ago
- Hacking Tool!! This Tools help you with ethical hacking, Social media hack, phone info, Gmail attack, phone number attack, user discovery…☆19Dec 23, 2024Updated last year
- Offensive toolkit and BloodHound graph creator for DPAPI blobs and master key files☆15Jan 10, 2026Updated 4 months ago
- Python3 tool to perform password spraying using RDP☆17Aug 14, 2023Updated 2 years ago
- ☆16May 6, 2015Updated 11 years ago
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆17Aug 20, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- This toll is For Kali Linux. This is powerful tool that can connect your whole pc with tor network. Forgot the Tor Browser. Now you can u…☆31Oct 3, 2025Updated 7 months ago
- Exploit app for CVE-2022-20494, a high severity permanent denial-of-service vulnerability that leverages Android's DND (Do not disturb) f…☆27Mar 3, 2023Updated 3 years ago
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆17Jun 11, 2024Updated last year
- A fully public exploit of the CVE-2020-0022 BlueFrag Android RCE Vulnerability (tested on Pixel 3 XL)☆22Nov 21, 2023Updated 2 years ago
- ARM 32-bit Raspberry Pi Hacking Hello World example in Kali Linux.☆16Nov 27, 2025Updated 5 months ago
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆13Mar 20, 2024Updated 2 years ago
- Python support for Flipper Zero (smaller edition)☆12Nov 20, 2024Updated last year
- Metasploit/MSFVenom Payload Generator Stand Alone☆32May 5, 2017Updated 9 years ago
- Gets the name of all currently running process then checks them against a list of known defensive products such as AV's, EDR's and loggin…☆14Oct 8, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Automated PowerShell installer for *Nix with multi Distro support.☆20Nov 21, 2018Updated 7 years ago
- TXT and PDF documents from the NSA☆15Mar 24, 2015Updated 11 years ago
- ☆13Sep 24, 2023Updated 2 years ago
- xorhunx adalah tool cryptography☆14Jun 21, 2023Updated 2 years ago
- firmwalker加强版,增加了一些信息泄露关键字。☆19Mar 1, 2023Updated 3 years ago
- A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.☆10Jan 7, 2020Updated 6 years ago
- Man in the browser attack is all about stealing credentials from sites running in internet-explorer by forcing user to logout and then ag…☆11Feb 17, 2023Updated 3 years ago