Autonomous Assumed Breach Penetration-Testing Active Directory Networks
☆70Apr 8, 2026Updated last week
Alternatives and similar repositories for cochise
Users that are interested in cochise are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- NTFSx is a tool for extracting files from an NTFS filesystem that are otherwise inaccessible.☆14Jul 26, 2013Updated 12 years ago
- A Spring Boot application exposing OWASP ZAP as an MCP (Model Context Protocol) server. It lets any MCP‑compatible AI agent (e.g., Claude…☆47Updated this week
- A curated list of browser fuzzing researches, papers, tools, ...☆15Jan 30, 2023Updated 3 years ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆16Apr 10, 2025Updated last year
- This repository contains attack chains generated by Aurora that can be reproduced in virtual environments.☆45Jan 25, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆12Jun 19, 2024Updated last year
- Offensive recon with GitHub Actions☆11Aug 25, 2024Updated last year
- POC for CVE-2024-23897 Jenkins File-Read☆39Nov 20, 2025Updated 4 months ago
- This repository includes code for the paper "Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networ…☆14Mar 5, 2025Updated last year
- [IEEE T-IFS] AutoPT: How Far Are We from the Fully Automated Web Penetration Testing?☆32Mar 28, 2026Updated 2 weeks ago
- Benchmark of LLMs on real open-source projects against dependency hell, legacy toolchains, and complex build systems.☆54Dec 23, 2025Updated 3 months ago
- PoC☆12Apr 7, 2025Updated last year
- Fairy Law - Compromise or disable EDR security solutions☆71Dec 1, 2025Updated 4 months ago
- GenAI-STIX2.1-Generator is a tool that leverages Azure OpenAI capabilities to transform threat intelligence reports from unstructured web…☆24Mar 24, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Remote Java classpath enumeration via deserialization☆22May 23, 2023Updated 2 years ago
- Ivanti Pulse Secure CVE-2023-46805 Scanner - Based on Assetnote's Research☆13Jan 19, 2024Updated 2 years ago
- A fast port scanner written in go with a focus on reliability and simplicity.☆21Oct 21, 2024Updated last year
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15May 23, 2023Updated 2 years ago
- ☆10Aug 27, 2022Updated 3 years ago
- ☆19Dec 30, 2023Updated 2 years ago
- This approach of Intrusion Detection uses two GPT models, which are trained on normal network traffic, to predict sequences of communicat…☆11Oct 3, 2023Updated 2 years ago
- Phishing Framework for OTP codes☆48Apr 7, 2026Updated last week
- 根据语法规则生成模拟句子☆12Jan 21, 2019Updated 7 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- The AMSI server for Avred☆33Sep 15, 2023Updated 2 years ago
- CVE-2025-68428 Proof of Concept☆24Jan 8, 2026Updated 3 months ago
- 这个仓库包含了我在上人工智能课时完成的拼音输入法作业。☆11Feb 16, 2022Updated 4 years ago
- LLVM-based ROP obfuscated compiler☆12Mar 24, 2022Updated 4 years ago
- Centralized docs of ProjectDiscovery☆24Apr 7, 2026Updated last week
- ☆14Feb 26, 2025Updated last year
- socat version 2☆10Aug 30, 2012Updated 13 years ago
- The official implementation for Common Sense Enhanced Knowledge-based Recommendation with Large Language Model☆14Apr 21, 2024Updated last year
- PowerShell Core Profile Directory☆24Jan 18, 2024Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Jenkins Security Research or Hacking Jenkins ;)☆12Dec 10, 2024Updated last year
- ☆12Sep 6, 2020Updated 5 years ago
- ☆12Nov 20, 2023Updated 2 years ago
- Enterprise AI Security Platform - Real-time firewall protection for LLM applications against prompt injection, data leakage, and function…☆23Sep 14, 2025Updated 7 months ago
- Simulate Windows EXE for Malware Research!☆19Sep 4, 2024Updated last year
- 词、句拼音转汉字、拼音分割、拼音补全、pygame输入中文☆15Mar 21, 2020Updated 6 years ago
- SimCSE☆15Oct 1, 2022Updated 3 years ago