☆142Jan 28, 2026Updated last month
Alternatives and similar repositories for spikee
Users that are interested in spikee are comparing it to the libraries listed below
Sorting:
- Integrate PyRIT in existing tools☆55Feb 23, 2026Updated last week
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆42Oct 29, 2024Updated last year
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆13Jul 16, 2025Updated 7 months ago
- Beagle(bone) in the Middle☆25Oct 9, 2020Updated 5 years ago
- ☆14Jun 7, 2024Updated last year
- An extension for Burp's Web Vulnerability Scanner that can detect API discovery metadata and extract data useful during recon.☆19Sep 13, 2025Updated 5 months ago
- A Nemesis powered Retrieval-Augmented Generation (RAG) chatbot proof-of-concept.☆70Aug 4, 2025Updated 6 months ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- Golang Shlyuz Implant Implementation☆13May 23, 2025Updated 9 months ago
- This project is a deliberately vulnerable environment to learn about LLM-specific risks based on the OWASP Top 10 for LLM Applications.☆50Jan 19, 2026Updated last month
- ☆370Jun 25, 2025Updated 8 months ago
- Azure DevOps Services Attack Toolkit☆150Mar 15, 2025Updated 11 months ago
- Research Links for LLM Security☆17May 27, 2024Updated last year
- gpoParser is a tool designed to extract and analyze configurations applied through Group Policy Objects (GPOs) in an Active Directory env…☆334Jan 14, 2026Updated last month
- MacOS Shared Library to Shellcode Loader☆54Feb 23, 2026Updated last week
- Discover DYLD_INSERT_LIBRARIES hijacks on macOS☆45Sep 15, 2022Updated 3 years ago
- Run TTPs, with AI!☆71Feb 23, 2026Updated last week
- Dropbox LLM Security research code and results☆255May 21, 2024Updated last year
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55May 7, 2025Updated 9 months ago
- ☆146Jul 24, 2025Updated 7 months ago
- ☆21Aug 30, 2025Updated 6 months ago
- ☆22Jun 9, 2025Updated 8 months ago
- ☆21Jul 26, 2025Updated 7 months ago
- ☆26Nov 8, 2024Updated last year
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆195Nov 27, 2024Updated last year
- A Python library for guardrail models evaluation.☆32Oct 9, 2025Updated 4 months ago
- LSASS enumeration like pypykatz written in C-Lang☆20Dec 1, 2021Updated 4 years ago
- ☆190Nov 21, 2024Updated last year
- Python3 rewrite of AsOutsider features of AADInternals☆60Jul 23, 2025Updated 7 months ago
- BOF template with boflink and mutator kit support☆49Jan 8, 2026Updated last month
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆57Nov 10, 2024Updated last year
- Shellcode and In-PowerShell solution for patching AMSI via Page Guard Exceptions☆63Nov 15, 2025Updated 3 months ago
- Hiding your infrastructure from the boys in blue.☆23Oct 18, 2021Updated 4 years ago
- C# .Net Framework program that uses RunspaceFactory for Powershell command execution.☆24Nov 9, 2022Updated 3 years ago
- Extension functionality for the NightHawk operator client☆26Oct 31, 2023Updated 2 years ago
- Recon scripts for Red Team and Web blackbox auditing☆26Feb 20, 2026Updated last week
- Python code to Serialize and Unserialize java binary serialization format.☆30Updated this week
- Exploit for Arbitrary File Move vulnerability in ZoneAlarm AV☆26Sep 26, 2022Updated 3 years ago
- Lastest Hashcat rules for password cracking☆67Feb 7, 2026Updated 3 weeks ago