Offline AI Security Assistant for Air-Gapped Pentesting
☆65Feb 22, 2026Updated last week
Alternatives and similar repositories for syd
Users that are interested in syd are comparing it to the libraries listed below
Sorting:
- ☆75Feb 15, 2025Updated last year
- SpicyAD is a C# Active Directory penetration testing tool designed for authorized security assessments. It combines multiple AD attack te…☆99Dec 23, 2025Updated 2 months ago
- 一款支持检测web应用程序未授权访问缺陷的burp suite插件,可自定义配置检测字段以及返回包json数据分析☆12Apr 22, 2024Updated last year
- Automatic multiprocess Linux CLI tool that aims for a quick enumeration wrapping pentesting tools.☆13Feb 22, 2026Updated last week
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Jul 17, 2023Updated 2 years ago
- This script is written in Perl this is very good admin page finder.☆11Aug 29, 2020Updated 5 years ago
- A collection of phishing techniques used to evade detection. #nolockdown☆23Aug 28, 2025Updated 6 months ago
- Active Directory share enumeration tool☆12Apr 28, 2025Updated 10 months ago
- ☆11Aug 25, 2018Updated 7 years ago
- Burp extension to automatically drop requests that match a certain regex.☆10Mar 10, 2023Updated 2 years ago
- A powerful Burp Suite extension that automatically detects JavaScript URLs from HTTP traffic, scans them using TruffleHog for secrets det…☆31Oct 23, 2025Updated 4 months ago
- WinRemoteEnum is a module-based collection of operations achievable by a low-privileged domain user.☆13Oct 24, 2022Updated 3 years ago
- An python script that use apkleaks to scan the android application over web☆11Jun 2, 2022Updated 3 years ago
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- 基于Kubernetes v1.22.2集群部署ELK日志分析系统。并收集与展示Nginx的access访问日志。☆12Jan 26, 2022Updated 4 years ago
- A collection off SVG for Home Assistant☆13Apr 25, 2025Updated 10 months ago
- This small script helps to avoid using MetaSploit (msfconsole) during the Enterprise pentests and OSCP-like exams. Grep included function…☆14Mar 9, 2023Updated 2 years ago
- Scanner for misconfigured DevSecOps or Security tools on internet like SonarQube, GoPhish etc.☆12Apr 4, 2025Updated 11 months ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Virtual host bruteforcer against given network range or single ip☆11Mar 21, 2019Updated 6 years ago
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated 11 months ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆25Jun 11, 2025Updated 8 months ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 3 weeks ago
- A command line tool that turns CBOR into JSON or JSON into CBOR☆13Aug 27, 2023Updated 2 years ago
- Synopsis information for use with Rocky5's custom XBMC scripts and custom xbe. XBMC 3.5.3 minimum. Excel spreadsheet with the most comple…☆12May 1, 2020Updated 5 years ago
- Lightweight reflection scanner☆20Aug 31, 2025Updated 6 months ago
- ☆12Apr 17, 2022Updated 3 years ago
- 一款集成了Nuclei模板管理、多空间引擎搜索的网络安全工具集。为安全研究人员提供高效的工作体验。☆22Feb 12, 2026Updated 3 weeks ago
- I was searching for such resource to work as cheat sheet series and guide me through different attack scenarios for API attacks, didn’t f…☆15May 5, 2025Updated 10 months ago
- Recon tool for URLs discovery☆12Jun 19, 2024Updated last year
- ☆10Aug 9, 2024Updated last year
- A simple CDR software for disarming malicious contents contained in documents.☆10Nov 7, 2022Updated 3 years ago
- ☆15Apr 27, 2020Updated 5 years ago
- All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.☆41Jul 21, 2020Updated 5 years ago
- Tool for MSSQL relay audit and abuse☆58Dec 17, 2024Updated last year
- Decrypt Chromium based browser passwords with PowerShell.☆134Nov 14, 2025Updated 3 months ago
- Automation for NPM reverse proxy manager☆13Feb 17, 2025Updated last year
- Advanced JWT decoding & cracking toolkit with a user-friendly UI for security testing☆48Jan 18, 2026Updated last month
- Collection of extracted System Prompts from popular chatbots like ChatGPT, Claude & Gemini☆31Jun 1, 2025Updated 9 months ago