Turn any LLM into an autonomous pentester. You define the scope, the agent does the work, you review the findings.
☆352May 1, 2026Updated this week
Alternatives and similar repositories for AIDA
Users that are interested in AIDA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This lab is for **EDUCATIONAL PURPOSES ONLY**. Use it responsibly and only on systems you own or have explicit permission to test. Do not…☆19Feb 20, 2026Updated 2 months ago
- Pipeleek scans CI/CD logs and artifacts to detect leaked secrets and pivot from them☆19Updated this week
- A Pentesters Confluence Keyword Scanner☆17Dec 3, 2024Updated last year
- Mine URLs from Browser's Heap Snapshot for fun and profit☆65Aug 9, 2023Updated 2 years ago
- Shell Environment Swiss Army Knife☆17Mar 26, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Some python scripts I wrote that help with various specialized AWS security things☆10Jan 15, 2020Updated 6 years ago
- Phantom is project created to perform loading and executing unmanaged code in memory within an IIS environment running in full‑trust mode…☆103Apr 27, 2026Updated last week
- Herramienta de BugBounty atutomatizada☆44Mar 25, 2026Updated last month
- SAFi is the open-source runtime governance engine that makes AI auditable and policy-compliant. Built on the Self-Alignment Framework, it…☆43Feb 10, 2026Updated 2 months ago
- Fast and passive subdomain enumeration.☆20Apr 18, 2022Updated 4 years ago
- Nim implementation for sud0Ru's Credential Dumping from SAM/SECURITY Hives Method (a.k.a. SilentHarvest)☆105Apr 4, 2026Updated last month
- Deliberately vulnerable AWS resources for security assessment demos☆32Aug 20, 2022Updated 3 years ago
- AWS CloudTrail CloudFormation template which creates KMS encryption keys, an encrypted S3 bucket, and enables CloudTrail☆14May 26, 2024Updated last year
- Workflow automation for Security Teams☆331Apr 16, 2026Updated 2 weeks ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Configure AWS accounts for CloudTrail, Root Account Usage Monitor.☆13Aug 24, 2015Updated 10 years ago
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆14Feb 16, 2021Updated 5 years ago
- ☆25Feb 18, 2025Updated last year
- Linux Driver for Realtek RTL8851BE, RTL8852AE, RTL8852BE and RTL8852CE☆28Jul 20, 2025Updated 9 months ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- A list of questions that can be asked during an interview for a cloud architect position.☆11Nov 27, 2021Updated 4 years ago
- ☆44Mar 30, 2026Updated last month
- Listing of resources for example AWS Service Control Policies (SCPs)☆16Jan 10, 2024Updated 2 years ago
- My fuzz repo!☆22Jul 28, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Crawljax: Crawling JavaScript-based Ajax Web Applications☆22Jan 27, 2026Updated 3 months ago
- Collection of antivirus bypass techniques☆13Nov 20, 2023Updated 2 years ago
- InfoStealer and worm networking brute telnet,ftp,ssh,smb,rdp combine together both are bestfriend☆45Apr 14, 2026Updated 3 weeks ago
- Host Internal Static Website on AWS☆17Dec 6, 2023Updated 2 years ago
- An open taxonomy and scoring framework for evaluating AI agent sandboxes: 7 defense layers, 7 threat categories, 3 evaluation dimensions,…☆63Apr 14, 2026Updated 3 weeks ago
- For unpacking base64:ed "Save items"-content from Burp (From search + proxy history)☆54Feb 26, 2025Updated last year
- Windows_Exfil** is a proof-of-concept script for automating data collection and exfiltration via Flipper Zero🐬configured as a "BadUSB." …☆21Dec 26, 2024Updated last year
- ☆60May 25, 2023Updated 2 years ago
- ☆22Jan 6, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- This repository contains a basic custom lab environment designed to demonstrate and explore SQL injection vulnerabilities. The lab provid…☆10Sep 20, 2023Updated 2 years ago
- z/OS Mainframe TSO Logon panel account enumerator and brute forcer☆32May 24, 2013Updated 12 years ago
- Automated prompt injection testing framework for LLM-integrated applications with dual-LLM architecture.☆189Mar 14, 2026Updated last month
- Remove duplicate URLs by retaining only the unique combinations of hostname, path, and parameter names☆39May 5, 2024Updated 2 years ago
- My lab notes and learning progress for the PortSwigger Web Security Academy's SQL Injection chapter.☆12Aug 10, 2023Updated 2 years ago
- Hands-on MCP security lab: 10 real incidents reproduced with vulnerable/secure MCP servers, pytest regressions, and Claude/Cursor battle-…☆88Dec 3, 2025Updated 5 months ago
- Cool One Liners at one place to make your recon and bug bounty skills better !☆15Oct 3, 2020Updated 5 years ago