AI-Driven Security Assessment - Connect AI to 400+ pentesting tools via MCP
☆305Apr 12, 2026Updated this week
Alternatives and similar repositories for AIDA
Users that are interested in AIDA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This lab is for **EDUCATIONAL PURPOSES ONLY**. Use it responsibly and only on systems you own or have explicit permission to test. Do not…☆18Feb 20, 2026Updated last month
- Pipeleek scans CI/CD logs and artifacts to detect leaked secrets and pivot from them☆19Apr 8, 2026Updated last week
- A Pentesters Confluence Keyword Scanner☆17Dec 3, 2024Updated last year
- A simple streamlit app to play with qwen3-2b-VL to perform OCR. Dockerized set up, tested with 3060 12 GB.☆31Nov 23, 2025Updated 4 months ago
- BYOVD hunter to help prioritize windows drivers worth manual analysis☆130Aug 19, 2025Updated 7 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Mine URLs from Browser's Heap Snapshot for fun and profit☆65Aug 9, 2023Updated 2 years ago
- Shell Environment Swiss Army Knife☆17Mar 26, 2024Updated 2 years ago
- Some python scripts I wrote that help with various specialized AWS security things☆10Jan 15, 2020Updated 6 years ago
- Phantom is project created to perform loading and executing .NET assemblies directly in memory within an IIS environment running in full‑…☆99Mar 10, 2026Updated last month
- Shellcode loader based on indirect syscall☆22Feb 9, 2025Updated last year
- Herramienta de BugBounty atutomatizada☆43Mar 25, 2026Updated 3 weeks ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆18Jun 1, 2024Updated last year
- LuxDevHQ Data Engineering Course Guide☆11Jan 25, 2026Updated 2 months ago
- Fast and passive subdomain enumeration.☆19Apr 18, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Deliberately vulnerable AWS resources for security assessment demos☆32Aug 20, 2022Updated 3 years ago
- Workflow automation for Security Teams☆312Updated this week
- Asset definitions for an organization's external attack surface☆59Mar 6, 2026Updated last month
- AWS CloudTrail CloudFormation template which creates KMS encryption keys, an encrypted S3 bucket, and enables CloudTrail☆14May 26, 2024Updated last year
- Configure AWS accounts for CloudTrail, Root Account Usage Monitor.☆13Aug 24, 2015Updated 10 years ago
- ☆25Feb 18, 2025Updated last year
- A list of questions that can be asked during an interview for a cloud architect position.☆11Nov 27, 2021Updated 4 years ago
- Listing of resources for example AWS Service Control Policies (SCPs)☆16Jan 10, 2024Updated 2 years ago
- ☆45Mar 30, 2026Updated 2 weeks ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Crawljax: Crawling JavaScript-based Ajax Web Applications☆22Jan 27, 2026Updated 2 months ago
- Collection of antivirus bypass techniques☆13Nov 20, 2023Updated 2 years ago
- InfoStealer and worm networking brute telnet,ftp,ssh,smb,rdp combine together both are bestfriend☆40Apr 7, 2026Updated last week
- A simple Windows application that allows the user to pick between IDA installation for the given file.☆31Oct 11, 2025Updated 6 months ago
- Watch CloudTrail and send notifications of every action to an slack channel.☆13Jun 15, 2018Updated 7 years ago
- Host Internal Static Website on AWS☆17Dec 6, 2023Updated 2 years ago
- Windows_Exfil** is a proof-of-concept script for automating data collection and exfiltration via Flipper Zero🐬configured as a "BadUSB." …☆21Dec 26, 2024Updated last year
- For unpacking base64:ed "Save items"-content from Burp (From search + proxy history)☆54Feb 26, 2025Updated last year
- Lnk crafting and research tools☆159Mar 4, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Repo for hosting rayder workflows☆63Aug 31, 2023Updated 2 years ago
- ☆114Updated this week
- Two WinForms GUI tools for enumerating, searching, and exfiltrating data from M365 environments using application-level OAuth tokens☆156Mar 4, 2026Updated last month
- ☆22Jan 6, 2025Updated last year
- This repository contains a basic custom lab environment designed to demonstrate and explore SQL injection vulnerabilities. The lab provid…☆10Sep 20, 2023Updated 2 years ago
- Hands-on MCP security lab: 10 real incidents reproduced with vulnerable/secure MCP servers, pytest regressions, and Claude/Cursor battle-…☆85Dec 3, 2025Updated 4 months ago
- Remove duplicate URLs by retaining only the unique combinations of hostname, path, and parameter names☆39May 5, 2024Updated last year