A cyber security toolkit blending manual testing with AI Agents
☆126Apr 22, 2026Updated last week
Alternatives and similar repositories for grroxy
Users that are interested in grroxy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- WriteUp For BUUCTF-Pwn☆12Dec 5, 2022Updated 3 years ago
- # Keylogger-BOF☆46Mar 13, 2026Updated last month
- Documenting all the sources from where I'm learning Mobile(adnroid/IOS) bug bounty so if another researcher want to start with mobile bug…☆39Aug 13, 2025Updated 8 months ago
- SpecOps is a Burp Suite extension that ingests an OpenAPI or Swagger spec and instantly builds a workbench to test every documented endpo…☆32Mar 27, 2026Updated last month
- Pentesting tool to automate common op tasks and organize discovered data.☆14Mar 26, 2026Updated last month
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ⚡ Golang library for quick make pentest tools☆15Apr 7, 2025Updated last year
- crawl a website for links and expose all the vulnerable parameters.☆14Oct 2, 2022Updated 3 years ago
- Argument injection vulnerability in PHP☆13Jun 15, 2024Updated last year
- Webarchive is a Go package for pentesters and developers to interacting with the Wayback Machine's CDX API and integrate web archive util…☆11Feb 25, 2024Updated 2 years ago
- This vulnerability could allow an attacker to take complete control of a vulnerable Confluence server. This could allow the attacker to s…☆11May 24, 2024Updated last year
- Automated GitHub secret scanning with smart alerting & monitoring.☆31Jan 15, 2026Updated 3 months ago
- This guide provides comprehensive techniques for penetration testing Active Directory environments. It covers everything from initial rec…☆21Jul 3, 2025Updated 9 months ago
- A modular URL deduplication tool.☆19Feb 19, 2025Updated last year
- Space theme for KDE☆26Dec 18, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Detection: Identify the presence of the Ploutus malware by checking for known indicators of compromise (IoCs) such as specific files, reg…☆11Sep 5, 2024Updated last year
- ☆16May 17, 2024Updated last year
- Icegram Express - Email Subscribers, Newsletters and Marketing Automation Plugin <= 5.7.14 - Unauthenticated SQL Injection☆21Sep 15, 2024Updated last year
- A simple Bash script to discover all domains associated with a specific Microsoft 365 tenant - new replacement for check_mdi☆49Sep 23, 2025Updated 7 months ago
- ☆32Mar 28, 2025Updated last year
- My Custom made Nuceli-Templates☆22Aug 5, 2025Updated 8 months ago
- SMB password sprayer☆20Jan 19, 2019Updated 7 years ago
- Purpose-built Red Team network hardware implant made from common components.☆28Mar 18, 2023Updated 3 years ago
- Website for ail-typo-squatting library☆73Feb 25, 2026Updated 2 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- An elegant and flavored dark theme for vs code☆23Nov 8, 2018Updated 7 years ago
- Windows usermode rootkit with inline hooking for process/file/registry hiding, indirect syscalls, keylogger, HTTPS C2, dropper, and EDR/A…☆35Apr 17, 2026Updated last week
- Bring your own Unwind Data Framework☆135Mar 15, 2026Updated last month
- Proof of concept : CVE-2024-1071: WordPress Vulnerability Exploited☆22Aug 30, 2024Updated last year
- Openhunting CTI - Threat Exposure Data Breach Account (Telegram)☆69Dec 1, 2023Updated 2 years ago
- Droid LLM Hunter is a tool to scan for vulnerabilities in Android applications using Large Language Models (LLMs).☆101Mar 27, 2026Updated last month
- This tool is a simple LFI, RFI, RCE, and Joomla Components vulnerability scanner, created by JayCyberSecurity☆22Apr 26, 2022Updated 4 years ago
- A powerful subdomain enumeration tool that aggregates data from multiple sources to create comprehensive lists of root subdomains.☆48Dec 19, 2025Updated 4 months ago
- CF GeoBypasser Cyberpunk Framework is a Modular Offensive Toolkit designed to discover and bypass Cloudflare-based Geo-restrictions using…☆54Dec 10, 2025Updated 4 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- OmniCrawl is a web measurement tool that allows for recording of web requests and JavaScript browser API accesses on multiple platforms.☆28Mar 20, 2024Updated 2 years ago
- Web Application Penetration Testing Methodology☆53Nov 12, 2025Updated 5 months ago
- Results from analyzing data gathered from 1.6 billion subdomains☆32Oct 15, 2024Updated last year
- Remove duplicate URLs by retaining only the unique combinations of hostname, path, and parameter names☆39May 5, 2024Updated last year
- unicode abnormalizer to takes a unicode string and abnormalizes it by character replacment☆26Jun 27, 2020Updated 5 years ago
- 一个可以全端口捕获流量的简易蜜罐 tcppc: A simple honeypot to capture TCP/TLS/UDP payloads on ALL ports.☆13Aug 3, 2022Updated 3 years ago
- Security toolkit for AI agents. Scan your machine for dangerous skills and MCP configs, monitor for supply chain attacks, test prompt inj…☆199Apr 4, 2026Updated 3 weeks ago