☆83Aug 27, 2025Updated 6 months ago
Alternatives and similar repositories for auto-exploits
Users that are interested in auto-exploits are comparing it to the libraries listed below
Sorting:
- Calculate the domain age with python script☆11Mar 27, 2018Updated 7 years ago
- Active Directory share enumeration tool☆12Apr 28, 2025Updated 10 months ago
- Script for downloading Burp Suite extension files☆11Jan 29, 2024Updated 2 years ago
- These are tools I cheated with the help of ChatGPT to help me with Penetration Testing and Red Teaming☆15Feb 24, 2024Updated 2 years ago
- ☆11May 13, 2024Updated last year
- Sentinel Recon Tools Workbook☆14Aug 24, 2022Updated 3 years ago
- Malware that TeamTNT found and removed.☆14Nov 27, 2020Updated 5 years ago
- Automated compromise detection of the world's most popular packages☆17Sep 25, 2023Updated 2 years ago
- Simple Shellcode Runner in Rust Language☆18Dec 8, 2023Updated 2 years ago
- A tool for injecting custom JavaScript payloads into PDF files for penetration testing and XSS proof-of-concept generation.☆19Jan 10, 2025Updated last year
- This repository is used by FalconForce to release parts of the internal tools used for maintaining, validating and automatically deployin…☆17Mar 10, 2023Updated 2 years ago
- CVE-2023-1671-POC, based on dnslog platform☆17Apr 26, 2023Updated 2 years ago
- LLM-based automated patch diffing☆93Sep 15, 2025Updated 5 months ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆57Feb 19, 2026Updated last week
- Tiktok downloader☆18Dec 3, 2022Updated 3 years ago
- Burp Suite Extension for inserting a magic byte into responder's request☆24Sep 22, 2023Updated 2 years ago
- A BASH Script to automate the installation of the most popular bug bounty tools☆25Dec 24, 2025Updated 2 months ago
- Intel Retrieval Augmented Generation (RAG) Utilities☆91Jan 29, 2024Updated 2 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆57Aug 11, 2023Updated 2 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆25Dec 14, 2021Updated 4 years ago
- SAST and DAST Scan Supported with 400 plus rules available for secrets and allow you add your own wordlist as well. lightweight source c…☆109Aug 21, 2025Updated 6 months ago
- Token Tailor is a Burp Suite Community Edition extension that aims to simplify security testing by automating JWT renewal.☆35Sep 30, 2025Updated 5 months ago
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆49Jul 8, 2025Updated 7 months ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆28Nov 3, 2018Updated 7 years ago
- A swiss army knife for pentesting networks☆25Sep 3, 2022Updated 3 years ago
- CVE-2022-21907 Vulnerability PoC☆30Jan 23, 2022Updated 4 years ago
- OSINT tool for domain discovery☆10Apr 5, 2024Updated last year
- In-the-wild deepfake detection dataset☆13Mar 5, 2025Updated 11 months ago
- TEAM Mentor 3.x Released Code☆16Aug 5, 2016Updated 9 years ago
- Sliver extension to bypass UAC via cmstp written in rust☆37Jun 4, 2024Updated last year
- GitHub Action to analyze Pull Requests for open-source supply chain issues☆16Nov 4, 2025Updated 3 months ago
- This tool exploits Golden DMSA attack against delegated Managed Service Accounts.☆90Jul 15, 2025Updated 7 months ago
- A little cheatsheet for NetExec☆33May 2, 2024Updated last year
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆35Aug 21, 2023Updated 2 years ago
- Review of AWAE.OSWE☆31Mar 12, 2022Updated 3 years ago
- A basic username enumeration and password spraying tool aimed at spraying Microsoft's DOM based authentication using selenium.☆36Nov 27, 2023Updated 2 years ago
- Epyon is a swiss army knife tool for pentesting DevOps ecosystems.☆89Jan 26, 2026Updated last month
- Vulnerability☆33Oct 31, 2025Updated 4 months ago
- ☆97Apr 13, 2024Updated last year