A fun POC that is built to understand AI security agents.
☆34Oct 30, 2025Updated 4 months ago
Alternatives and similar repositories for cyber-safari
Users that are interested in cyber-safari are comparing it to the libraries listed below
Sorting:
- ☆14Oct 1, 2024Updated last year
- An AI-powered plugin for Caldera that orchestrates long-running LLM workflows to automatically create adversary emulation abilities and p…☆22Feb 2, 2026Updated last month
- A Cybersecurity Generalist LLM (ICLR'26)☆33Feb 9, 2026Updated last month
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆34Feb 28, 2025Updated last year
- Bypass Untethered without remove baseband☆13Mar 12, 2024Updated last year
- Convert activation_record.plist to IC-Info.sisv☆15Mar 24, 2023Updated 2 years ago
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆34Jan 4, 2025Updated last year
- iOS bootchain patchers in Python☆13Jan 23, 2024Updated 2 years ago
- A guide to simplify the process of evaluating Datadog's Cloud SIEM security capabilities to detect AWS threats.☆20Jul 24, 2023Updated 2 years ago
- ifpdz did not code checkra1n windows, here's the source☆17Oct 30, 2022Updated 3 years ago
- A National Vulnerability Database (NVD) API query tool☆17Jun 27, 2023Updated 2 years ago
- ChatCVE is an app using the Langchain SQL Language Tool to give a LLM prompt experience to CVE and SBOM DevSecOps Triage Data☆22Dec 14, 2025Updated 2 months ago
- This GitHub repository contains lessons for developing Microsoft Security CoPilot plugins☆20May 15, 2024Updated last year
- ☆19Sep 3, 2021Updated 4 years ago
- This repository is archived. Please refer to https://github.com/HoolockLinux/linux instead.☆18Apr 7, 2025Updated 11 months ago
- Passcode/Disabled tool by st0rm team free to use :)☆19Oct 26, 2020Updated 5 years ago
- ☆20Jan 19, 2026Updated last month
- A simple graphical utility to activate and deactivate iDevices in GNU/Linux☆23Aug 12, 2010Updated 15 years ago
- some research results of sep☆20Apr 9, 2021Updated 4 years ago
- autoreport generates bug report templates for security researchers☆20Aug 4, 2023Updated 2 years ago
- Welcome to the hands-on resource hub for the Generative AI Development Environments Bootcamp. This repo is designed to help you explore d…☆25Oct 22, 2025Updated 4 months ago
- A6 checkm8 exploit with checkra1n 0.1337 method.☆22Jan 14, 2024Updated 2 years ago
- Booting SSH ramdisk on 64-bit iOS devices (A7-A11)☆32Sep 10, 2023Updated 2 years ago
- Open Sourced application for Jailbroken device. Program is executing commands on connected iphones☆23Nov 19, 2021Updated 4 years ago
- Scans crossdomain.xml policies for expired domain names.☆26Aug 4, 2015Updated 10 years ago
- Build Go applications for IOS☆27Aug 19, 2019Updated 6 years ago
- Tools one could use for iOS related projects☆24Nov 14, 2023Updated 2 years ago
- ☆120May 26, 2025Updated 9 months ago
- OWASP Foundation Web Respository☆26Jan 27, 2026Updated last month
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆79Feb 27, 2026Updated last week
- Files for my Python3 Create Your Own Tool Series☆25Jul 21, 2022Updated 3 years ago
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆36Mar 24, 2025Updated 11 months ago
- ☆51Feb 25, 2025Updated last year
- Tools for customizing iOS restore ramdisks.☆28Aug 26, 2020Updated 5 years ago
- Syscfg editing utility☆35Mar 18, 2022Updated 3 years ago
- OSINT tool for domain discovery☆10Apr 5, 2024Updated last year
- A simple code that uses sparserestore exploit to upload files on an activated device(no JB required)☆42Oct 18, 2024Updated last year
- The tool under this branch fork can be used to crack devices above A12 and up to A15. After cracking, you can also use SSH channel strong…☆39Mar 5, 2022Updated 4 years ago
- pongoOS☆10Feb 15, 2024Updated 2 years ago