fkie-cad / bountyhunterView external linksLinks
A Caldera plugin for the emulation of complete, realistic cyberattack chains.
☆61Nov 19, 2025Updated 2 months ago
Alternatives and similar repositories for bountyhunter
Users that are interested in bountyhunter are comparing it to the libraries listed below
Sorting:
- prel(iminary) is an application that temporarily assigns Google Cloud IAM Roles and includes an approval process.☆45Updated this week
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- Unauthenticated enumeration of AWS IAM Roles.☆26Sep 7, 2025Updated 5 months ago
- ☆14Jan 8, 2026Updated last month
- Optimize the utilization of GHAS licenses in an enterprise (or organization)☆15Updated this week
- Convert a raw firmware image to an ELF file.☆13Feb 6, 2019Updated 7 years ago
- BlueSky OSINT Tool☆14Dec 10, 2024Updated last year
- ☆14Sep 11, 2023Updated 2 years ago
- ☆14Jul 9, 2024Updated last year
- Quantum Computing with Silq Programming, published by Packt☆16Jan 30, 2023Updated 3 years ago
- Autonomous AI C2☆33Jul 23, 2024Updated last year
- Mimojas Firmware Toolkit for unpacking and analysis firmware images☆14May 23, 2020Updated 5 years ago
- Simple PoC for demonstrating Race Conditions on Websockets☆55Sep 14, 2023Updated 2 years ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆141Jan 2, 2025Updated last year
- Web Server Vulnerability Scanning Tool☆36Mar 11, 2025Updated 11 months ago
- Scan your account for the use of untrusted AMIs☆31Updated this week
- ☆18Jul 30, 2024Updated last year
- An automated Adversary Emulation lab with terraform and MCP server. Build Caldera techniques and operations assisted with LLMs. Built f…☆205Nov 23, 2025Updated 2 months ago
- The following code when compiled in go takes a domain name as an argument and outputs an HTML file with Google Search links for various d…☆17Sep 11, 2024Updated last year
- A multifaceted security tool which leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting and more.☆171Jan 9, 2026Updated last month
- Machine Learning for Source Code Analysis☆17Nov 20, 2023Updated 2 years ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- A How-To Guide on using Security Commands and Observing Network Traffic on Wireshark☆18Jan 27, 2026Updated 2 weeks ago
- Purple-team telemetry & simulation toolkit.☆106Dec 16, 2025Updated 2 months ago
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆95Feb 3, 2026Updated 2 weeks ago
- ☆114Jun 8, 2023Updated 2 years ago
- Repository with supporting materials for Invictus Academy/Training☆44Jan 3, 2025Updated last year
- Simulator forked from ICSim used during Car Hacking Workshops☆19Aug 30, 2024Updated last year
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆114Nov 19, 2024Updated last year
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated 10 months ago
- source code for the offsecml framework☆44Jun 6, 2024Updated last year
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆60Feb 5, 2025Updated last year
- ☆18Aug 5, 2020Updated 5 years ago
- A cybersecurity tool designed to safeguard against IDN Homograph Attacks☆45Aug 5, 2025Updated 6 months ago
- A PoC exploit for CVE-2022-41622 - a CSRF in F5 BIG-IP control plane that leads to remote root☆21Oct 20, 2022Updated 3 years ago
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆265Nov 21, 2025Updated 2 months ago
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆84Aug 5, 2024Updated last year
- A library for intercepting system calls☆103Jan 5, 2025Updated last year