Automated Penetration Testing Mind Map with Artificial Intelligence
☆51Jun 29, 2025Updated 10 months ago
Alternatives and similar repositories for hexflow
Users that are interested in hexflow are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- MetaX - Advanced XSS Vulnerability Detector☆15Dec 30, 2025Updated 4 months ago
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆21Jul 18, 2023Updated 2 years ago
- Misr: The Ultimate Vulnerability Scanner☆16Aug 9, 2024Updated last year
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Apr 20, 2026Updated last month
- ☆10Mar 31, 2021Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Turn your Raspberry Pi Pico into a hacking device☆13Mar 7, 2024Updated 2 years ago
- This tools used for Automating finding of subdomain, and checking for alive subdomain, and gathering js files from all the subdomain and …☆22Jun 28, 2024Updated last year
- ☆13Oct 21, 2024Updated last year
- automated tool designed to streamline the search and identification of Proofs of Concept (POCs)☆23Apr 30, 2024Updated 2 years ago
- Swagger UI >=3.14.1 < 3.38.0 XSS payload☆24Mar 31, 2024Updated 2 years ago
- Interactive reference guide for pentesting DevOps pipelines. 60+ tools with attack vectors. Credits: Tom & Colbert from Accenture (Fusion…☆41Oct 8, 2025Updated 7 months ago
- Installs and adjusts Pentest tools.☆10Oct 19, 2022Updated 3 years ago
- ☆21Jan 3, 2025Updated last year
- a small demo repo to show how I got neuralbeagle14-7b running locally on my 8GB GPU☆14Jan 29, 2024Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆17May 22, 2024Updated last year
- CICD Using GitHub Action and Harness☆19Apr 27, 2023Updated 3 years ago
- A bash and powershell script to download the latest version of Burp-Suite Professional and use it for free.☆20May 7, 2023Updated 3 years ago
- A simple SQL injection vulnerable web application powered by Docker☆24Mar 16, 2024Updated 2 years ago
- pwnkit: Local Privilege Escalation in polkit's pkexec (CVE-2021-4034)☆25Jan 30, 2022Updated 4 years ago
- ☆17Oct 15, 2024Updated last year
- INE eJPT Cheat Sheet / Course Notes. You'll find my comprehensive course notes, which also serve as cheat sheets for the eJPTv2 course. T…☆106Aug 24, 2025Updated 8 months ago
- The Microsoft Student Security Operations Center (SOC) Toolkit is designed to equip facilitators with everything needed to prepare high s…☆23Jul 1, 2025Updated 10 months ago
- Collection of templates from various resources☆46Apr 30, 2026Updated 3 weeks ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Blank methodology sheet for the OSWE exam☆13Dec 17, 2021Updated 4 years ago
- Backdoor that leverages Nmap with setuid permissions to execute commands as root through a Lua-loaded C library☆53Oct 28, 2025Updated 6 months ago
- This repository is dedicated to documenting and sharing bug bounty reports. The goal is to help security researchers and developers: Le…☆13Mar 4, 2026Updated 2 months ago
- ☆22Oct 30, 2022Updated 3 years ago
- You can gather useful information accounts by username across all types networks ( which also include social media)☆29Oct 19, 2023Updated 2 years ago
- Enrich your investigations on IPs, Domains etc. with OSINT☆65Apr 4, 2024Updated 2 years ago
- Wireless Network Security Analysis Tool Modular terminal toolkit for Wi-Fi security assessment, handshake/PMKID capture, and network dia…☆20May 9, 2026Updated last week
- Tool to bypass 40X response codes.☆37Sep 18, 2022Updated 3 years ago
- Sample scripts to help you undertake analysis in AWS Region to Region Migrations☆23Nov 23, 2025Updated 5 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Summarize .vtt files into meeting notes☆33May 20, 2024Updated 2 years ago
- Securing LLM's Against Top 10 OWASP Large Language Model Vulnerabilities 2024☆23May 10, 2024Updated 2 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using mailg…☆27Jul 19, 2024Updated last year
- Aspx reverse shell☆125Feb 4, 2020Updated 6 years ago
- A Bash script for automated nuclei dast scanning by using passive urls☆127Mar 5, 2025Updated last year
- ☆25Dec 7, 2024Updated last year
- Links and guidance related to the return on mitigation report in the Microsoft Digital Defense Report☆29Oct 10, 2023Updated 2 years ago