SuperClaw: Red-Team AI Agents Before They Red-Team You
☆49Feb 2, 2026Updated 3 weeks ago
Alternatives and similar repositories for superclaw
Users that are interested in superclaw are comparing it to the libraries listed below
Sorting:
- A Very Cool Process Injector That supports both Shellcode injection and dll injection☆24Sep 22, 2025Updated 5 months ago
- PandaCrypter is a C#-based tool designed to convert PowerShell scripts into obfuscated batch files (.bat) with encryption and additional …☆44Aug 16, 2025Updated 6 months ago
- Satanic Crypter A powerful tool designed to convert EXE files into BAT files with advanced features and a modern GUI interface.☆10Jan 4, 2025Updated last year
- A stealthy Python dark web scraper using Tor. Crawl .onion sites anonymously, with retries, rate-limiting, and automatic Tor circuit rene…☆66Aug 5, 2025Updated 6 months ago
- BlackMail is a tool for creating and sending spoof mail.☆37Nov 16, 2023Updated 2 years ago
- Material For Malware Analysis Fundamentals Workshop By Eslam Abbas "Mr Robot"☆23Oct 9, 2025Updated 4 months ago
- Discord RAT made in powershell (open source)☆12Jul 16, 2025Updated 7 months ago
- Cybersecurity Psychology Framework☆19Updated this week
- NTLM Hash Generator☆10Apr 2, 2021Updated 4 years ago
- ModbusTCP Fuzzing and DoS Tool.☆11Aug 8, 2020Updated 5 years ago
- A curated list of awesome Claude Skills, resources, and tools for customizing Claude AI workflows☆123Dec 18, 2025Updated 2 months ago
- Automated pipeline for downloading, staging, ingesting, and investigating leaked and declassified archives (DDoSecrets, National Security…☆31Sep 22, 2025Updated 5 months ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- A backdoor is a tool used to gain remote access to a machine. Typically, backdoor utilities such as NetCat have 2 main functions: to pip…☆13Apr 26, 2021Updated 4 years ago
- Enhance your Google account security with this comprehensive guide. It covers strong passwords, two-factor authentication, phishing preve…☆11Nov 21, 2024Updated last year
- DuckyLogger: DuckyLogger is a Key Logger which captures every key stroke of traget and send them to attacker.☆10Apr 14, 2022Updated 3 years ago
- 🥧 Generates classic British dishes☆13Dec 27, 2022Updated 3 years ago
- A comprehensive, step-by-step guide for hardening your X (formerly Twitter) account security. Includes detailed instructions for 2FA, pas…☆12Mar 8, 2025Updated 11 months ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆45Apr 21, 2025Updated 10 months ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆50Feb 22, 2024Updated 2 years ago
- All my POC related to malware development☆15Feb 19, 2026Updated last week
- Pure Go rewrite of knockknock☆11Feb 7, 2023Updated 3 years ago
- 🛠️ Explore custom C2 TTPs with Aether-C2-Framework, focusing on lightweight Rust implants and stealthy transport stacks to reduce forens…☆18Updated this week
- Autonomous AI-powered security scanner — multi-agent vulnerability detection, exploitation, and validation engine☆35Updated this week
- Dialogs/Scenes/Transitions library for Oxygine☆10Dec 19, 2018Updated 7 years ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- Access radare2 from anywhere, anytime.☆42Feb 15, 2026Updated last week
- Golang script to bypass the client-side health checks when logging into DUO protected accounts☆11Aug 26, 2023Updated 2 years ago
- Visualise how much to spend on something that saves you time. Based on xkcd #1205: Is It Worth the Time?☆20Dec 23, 2025Updated 2 months ago
- Powershell scripts for exfiltration.☆12Oct 5, 2024Updated last year
- Ethereum smart contracts that have been used during successful ICOs☆11Feb 9, 2021Updated 5 years ago
- Step by step guide to setup Ethereum POA private chain☆12Feb 11, 2019Updated 7 years ago
- Ultra-lightweight HTTP file server for directory browsing and local development☆45Oct 11, 2025Updated 4 months ago
- Import custom queries into BloodHound CE from a legacy BloodHound JSON file.☆10Mar 22, 2024Updated last year
- This project enables malware to resurrect and remain hidden even after termination, using a User-Mode Program and Kernel-Mode Driver as p…☆10Jan 7, 2025Updated last year
- powerfull pentesting tool to checking email by smtp command☆10Feb 29, 2024Updated last year
- A modular and beginner-friendly toolkit to set up your Termux environment with essential tools in one click.☆18Apr 20, 2025Updated 10 months ago
- My first project using C++☆11Nov 20, 2025Updated 3 months ago
- Доступ к Blum с веб-версии Telegram.☆12May 30, 2024Updated last year