A very simple open source implementation of Google's Project Naptime
☆186Mar 27, 2025Updated last year
Alternatives and similar repositories for baby-naptime
Users that are interested in baby-naptime are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automated web vulnerability scanning with LLM agents☆463Jun 18, 2025Updated 10 months ago
- Web Server Vulnerability Scanning Tool☆36Mar 11, 2025Updated last year
- Burp Suite extension for testing Passkey systems.☆75Apr 1, 2025Updated last year
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆41May 7, 2023Updated 2 years ago
- Autonomous AI C2☆31Jul 23, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- CaptainCredz is a modular and discreet password-spraying tool.☆134Jul 22, 2025Updated 8 months ago
- Proof-of-concept modular implant platform leveraging v8☆54Mar 4, 2025Updated last year
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆100Apr 11, 2026Updated last week
- ☆18Feb 2, 2026Updated 2 months ago
- Addon for BHCE☆57Apr 1, 2025Updated last year
- 🌑 EclipseRecon is a personal project developed during my cybersecurity learning journey 🛡️. It helps practice web reconnaissance 🌐 by …☆29Nov 26, 2025Updated 4 months ago
- A collection of Turbo Intruder scripts.☆71Feb 1, 2025Updated last year
- Find what egress ports are allowed☆46Nov 19, 2025Updated 5 months ago
- ☆23Mar 4, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆45Apr 21, 2025Updated 11 months ago
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated last year
- ☆40Aug 2, 2024Updated last year
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆61Feb 5, 2025Updated last year
- Firebase Misconfiguration Detection Toolkit - To be presented at Blackhat EU Arsenal☆45Nov 6, 2025Updated 5 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆51Mar 10, 2025Updated last year
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 9 months ago
- 🧪 Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.☆41Dec 12, 2024Updated last year
- Unauthenticated enumeration of AWS IAM Roles.☆26Updated this week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated last year
- AIxCC: automated vulnerability repair via LLMs, search, and static analysis☆12Jul 16, 2024Updated last year
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆39Aug 8, 2025Updated 8 months ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆63Jan 25, 2025Updated last year
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆54Jan 26, 2026Updated 2 months ago
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Oct 17, 2024Updated last year
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆85Apr 7, 2026Updated last week
- Enhanced version of binaryninja-ollama and without using the ollama Python library☆13Jan 23, 2025Updated last year
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆15Apr 8, 2026Updated last week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆16Apr 10, 2025Updated last year
- A flexible framework for security teams to build and deploy AI-powered workflows that complement their existing security operations.☆155Feb 9, 2026Updated 2 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Sep 30, 2024Updated last year
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆99Apr 2, 2025Updated last year
- ☆16Jan 9, 2025Updated last year
- Finds imports that could be exploited, still requires manual analysis.☆29Nov 9, 2022Updated 3 years ago
- A tool to uncover undocumented APIs from the AWS Console.☆120Mar 16, 2026Updated last month