A very simple open source implementation of Google's Project Naptime
☆187Mar 27, 2025Updated last year
Alternatives and similar repositories for baby-naptime
Users that are interested in baby-naptime are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automated web vulnerability scanning with LLM agents☆463Jun 18, 2025Updated 10 months ago
- Web Server Vulnerability Scanning Tool☆37Mar 11, 2025Updated last year
- Burp Suite extension for testing Passkey systems.☆75Apr 1, 2025Updated last year
- CaptainCredz is a modular and discreet password-spraying tool.☆135Jul 22, 2025Updated 9 months ago
- Proof-of-concept modular implant platform leveraging v8☆55Mar 4, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆18Feb 2, 2026Updated 3 months ago
- Addon for BHCE☆57Apr 1, 2025Updated last year
- 🌑 EclipseRecon is a personal project developed during my cybersecurity learning journey 🛡️. It helps practice web reconnaissance 🌐 by …☆30Nov 26, 2025Updated 5 months ago
- A collection of Turbo Intruder scripts.☆72Feb 1, 2025Updated last year
- Find what egress ports are allowed☆47Nov 19, 2025Updated 5 months ago
- ☆24Mar 4, 2025Updated last year
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆45Apr 21, 2025Updated last year
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated last year
- ☆40Aug 2, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆63Feb 5, 2025Updated last year
- Framework for Monitoring File Ingestion Source for Yara Matches☆52Mar 10, 2025Updated last year
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 9 months ago
- 🧪 Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.☆42Dec 12, 2024Updated last year
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated last year
- AIxCC: automated vulnerability repair via LLMs, search, and static analysis☆13Jul 16, 2024Updated last year
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆39Aug 8, 2025Updated 9 months ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆63Jan 25, 2025Updated last year
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆56Apr 26, 2026Updated 2 weeks ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Oct 17, 2024Updated last year
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆86Apr 7, 2026Updated last month
- Enhanced version of binaryninja-ollama and without using the ollama Python library☆13Jan 23, 2025Updated last year
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆16May 2, 2026Updated last week
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆16Apr 10, 2025Updated last year
- A flexible framework for security teams to build and deploy AI-powered workflows that complement their existing security operations.☆156Feb 9, 2026Updated 3 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆37Sep 30, 2024Updated last year
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆100Apr 2, 2025Updated last year
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆151Feb 10, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆16Jan 9, 2025Updated last year
- Finds imports that could be exploited, still requires manual analysis.☆29Nov 9, 2022Updated 3 years ago
- A tool to uncover undocumented APIs from the AWS Console.☆121Mar 16, 2026Updated last month
- Verizon Burp Extensions: AI Suite☆142Apr 22, 2025Updated last year
- One Conference 2024☆110Oct 1, 2024Updated last year
- AcSecurity is a Python module designed to scan applications for common security vulnerabilities. It checks for hardcoded secrets, depende…☆16Aug 29, 2025Updated 8 months ago
- An autonomous LLM-agent for large-scale, repository-level code auditing☆382Mar 12, 2026Updated 2 months ago