SuperClaw: Red-Team AI Agents Before They Red-Team You
☆230Feb 2, 2026Updated 2 months ago
Alternatives and similar repositories for superclaw
Users that are interested in superclaw are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collaborate privately, brainstorm with friends, and co-create ideas with any AI model on a secure, real-time canvas that never spies.☆40Dec 11, 2025Updated 4 months ago
- Audit agent skill definitions for security, completeness, and compatibility across Codex, Claude Code, OpenClaw, and more☆37Feb 10, 2026Updated 2 months ago
- Mattermost is an open source platform for secure collaboration across the entire software development lifecycle..☆28Oct 20, 2025Updated 6 months ago
- A Very Cool Process Injector That supports both Shellcode injection and dll injection☆26Sep 22, 2025Updated 7 months ago
- ☆10Mar 25, 2025Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A standalone, offline HTML viewer for exploring and visualizing ChatGPT, DeepSeek, Claude, Grok, and Mistral conversation exports in a br…☆44Feb 17, 2026Updated 2 months ago
- The Best AI Tools☆21Updated this week
- 🛡⚔️AI-Powered Penetration Testing Framework with automated vulnerability scanning, multi-agent system, and compliance reporting🛡⚔️☆363Updated this week
- CrawlAI RAG is an AI-powered website intelligence platform that allows users to crawl entire websites, index their content, and ask natur…☆96Feb 15, 2026Updated 2 months ago
- Kanban board that helps you build software people love.☆78Sep 27, 2025Updated 7 months ago
- Rust library implementing the Toorani-Beheshti signcryption scheme☆13Aug 15, 2023Updated 2 years ago
- Cybersecurity Psychology Framework☆19Feb 22, 2026Updated 2 months ago
- Interactive XSS Labs to get into Client-Side Hacking☆86Feb 25, 2026Updated 2 months ago
- PandaCrypter is a C#-based tool designed to convert PowerShell scripts into obfuscated batch files (.bat) with encryption and additional …☆49Aug 16, 2025Updated 8 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Platform design skill pack: 300+ rules for Apple HIG, Material Design 3, and WCAG 2.2 across iOS, iPadOS, macOS, watchOS, visionOS, tvOS,…☆340Mar 19, 2026Updated last month
- Semi-Autonomous gstack Orchestration: Build with a strong product spec and let Garry Tan's gstack figure out the rest.☆177Mar 27, 2026Updated last month
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆52Jun 21, 2025Updated 10 months ago
- PDF extraction that checks its own work. #2 reading order accuracy — zero AI, zero GPU, zero cost.☆57Apr 16, 2026Updated last week
- BlackMail is a tool for creating and sending spoof mail.☆37Nov 16, 2023Updated 2 years ago
- Unclutter your .profile http://direnv.net☆14Feb 14, 2021Updated 5 years ago
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Jun 5, 2024Updated last year
- Simple bash script to spray known credentials against multiple services with netexec☆78Jan 16, 2026Updated 3 months ago
- Access radare2 from anywhere, anytime.☆45Apr 14, 2026Updated 2 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆45Apr 21, 2025Updated last year
- A cross-platform GUI application for easily downloading Hugging Face models without requiring technical knowledge or setup.☆28Nov 26, 2025Updated 5 months ago
- ☆46Apr 20, 2026Updated last week
- A stealthier approach to WMI-based command execution using Impacket without touching the disk.☆76Mar 15, 2026Updated last month
- From Dork to Download: Automating Google Dorks with Playwright☆44Mar 1, 2026Updated last month
- Reverse Shell troll software☆12Sep 24, 2019Updated 6 years ago
- A SAST skill that gives AI coding agents structured vulnerability detection across 34 vulnerability classes.☆227Apr 7, 2026Updated 3 weeks ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- Install and run Openclaw on a Raspberry Pi4 securely☆28Jan 31, 2026Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Enhance your Google account security with this comprehensive guide. It covers strong passwords, two-factor authentication, phishing preve…☆11Nov 21, 2024Updated last year
- A Docker & dev container setup for securely running AI agents in `--dangerous` mode. All container traffic is routed through a transparen…☆143Updated this week
- A stealthy Python dark web scraper using Tor. Crawl .onion sites anonymously, with retries, rate-limiting, and automatic Tor circuit rene …☆73Aug 5, 2025Updated 8 months ago
- An enhanced code editor using Ace editor☆29Mar 7, 2026Updated last month
- SnapDocs - A Modern, Open-Source Document Workspace☆25Sep 7, 2025Updated 7 months ago
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆219Mar 7, 2026Updated last month
- Telegram cybersecurity channels.☆20Oct 27, 2025Updated 6 months ago