☆83Aug 27, 2025Updated 6 months ago
Alternatives and similar repositories for auto-exploits
Users that are interested in auto-exploits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Active Directory share enumeration tool☆12Apr 28, 2025Updated 10 months ago
- These are tools I cheated with the help of ChatGPT to help me with Penetration Testing and Red Teaming☆15Feb 24, 2024Updated 2 years ago
- Simple Shellcode Runner in Rust Language☆18Dec 8, 2023Updated 2 years ago
- Automated compromise detection of the world's most popular packages☆16Sep 25, 2023Updated 2 years ago
- ☆11May 13, 2024Updated last year
- Calculate the domain age with python script☆11Mar 27, 2018Updated 7 years ago
- A python script for smart lightbulbs to show how badly you're losing money☆38Apr 28, 2025Updated 10 months ago
- Script for downloading Burp Suite extension files☆11Jan 29, 2024Updated 2 years ago
- LLM-based automated patch diffing☆97Sep 15, 2025Updated 6 months ago
- Malware that TeamTNT found and removed.☆14Nov 27, 2020Updated 5 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆57Aug 11, 2023Updated 2 years ago
- Custom Amsi Bypass by patching AmsiOpenSession function in amsi.dll☆52Jun 16, 2025Updated 9 months ago
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆21Nov 19, 2025Updated 4 months ago
- GMS-Sploit GhostManSec - Hacking Tool - 8 method hacking - GhostManS3c-Sploit v1.2-dev☆25Aug 13, 2023Updated 2 years ago
- Tiktok downloader☆18Dec 3, 2022Updated 3 years ago
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆24Dec 16, 2021Updated 4 years ago
- CVE-2023-1671-POC, based on dnslog platform☆17Apr 26, 2023Updated 2 years ago
- CVE-2025-5777 Citrix NetScaler Memory Leak Exploit (CitrixBleed 2)☆30Jul 11, 2025Updated 8 months ago
- Sentinel Recon Tools Workbook☆14Aug 24, 2022Updated 3 years ago
- HEVD Exploits for fun and learning.☆15Aug 30, 2025Updated 6 months ago
- In-the-wild deepfake detection dataset☆13Mar 5, 2025Updated last year
- SAST and DAST Scan Supported with 400 plus rules available for secrets and allow you add your own wordlist as well. lightweight source c…☆110Aug 21, 2025Updated 7 months ago
- CVE-2025-64155: Fortinet FortiSIEM Argument Injection to Remote Code Execution☆31Jan 13, 2026Updated 2 months ago
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆50Jul 8, 2025Updated 8 months ago
- ☆41Oct 8, 2024Updated last year
- ☆15Sep 4, 2024Updated last year
- Intel Retrieval Augmented Generation (RAG) Utilities☆91Jan 29, 2024Updated 2 years ago
- apkfram was written in order to help any mobile penetration testers to identify the Framework used to develop the Android application.☆12Oct 9, 2024Updated last year
- ☆13Jun 1, 2021Updated 4 years ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆35Aug 21, 2023Updated 2 years ago
- ☆16Mar 7, 2026Updated 2 weeks ago
- Burp Suite Extension for inserting a magic byte into responder's request☆24Sep 22, 2023Updated 2 years ago
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 7 months ago
- A list of OSINT resources and tools that may be useful when conducting investigations related to the Kingdom of Saudi Arabia☆12May 12, 2025Updated 10 months ago
- eBPF-https is an open source web application firewall (WAF)☆14Sep 11, 2024Updated last year
- A simple web app to get the latest EPSS data for a CVE ID☆12Dec 14, 2025Updated 3 months ago
- A little cheatsheet for NetExec☆33May 2, 2024Updated last year
- 🎇Vision: great List of Regex, Patterns, Google queries, public SPARQL, SQL, NoSQL - Regular Expressions(=Search Patterns=Data type defin…☆12Jul 9, 2025Updated 8 months ago
- Scanner for the SharePoint CVE-2025-53770 RCE zero day vulnerability.☆44Feb 10, 2026Updated last month