Automated Penetration Testing Mind Map with Artificial Intelligence
☆50Jun 29, 2025Updated 9 months ago
Alternatives and similar repositories for hexflow
Users that are interested in hexflow are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- MetaX - Advanced XSS Vulnerability Detector☆15Dec 30, 2025Updated 3 months ago
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Dec 3, 2025Updated 3 months ago
- ZeroHuntAI is an advanced source code vulnerability scanner designed to detect potential vulnerabilities in your codebase. It combines st…☆24May 9, 2025Updated 10 months ago
- Interactive reference guide for pentesting DevOps pipelines. 60+ tools with attack vectors. Credits: Tom & Colbert from Accenture (Fusion…☆38Oct 8, 2025Updated 5 months ago
- automated tool designed to streamline the search and identification of Proofs of Concept (POCs)☆20Apr 30, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆16Aug 25, 2025Updated 7 months ago
- ☆12Oct 21, 2024Updated last year
- Text Match Cut Video Generator Web App☆36Feb 19, 2026Updated last month
- Find secrets and passwords in container images and file systems☆15Nov 16, 2022Updated 3 years ago
- Installs and adjusts Pentest tools.☆10Oct 19, 2022Updated 3 years ago
- ☆21Jan 3, 2025Updated last year
- ☆14Jan 12, 2025Updated last year
- ☆17May 22, 2024Updated last year
- CICD Using GitHub Action and Harness☆19Apr 27, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A bash and powershell script to download the latest version of Burp-Suite Professional and use it for free.☆20May 7, 2023Updated 2 years ago
- A simple SQL injection vulnerable web application powered by Docker☆24Mar 16, 2024Updated 2 years ago
- INE eJPT Cheat Sheet / Course Notes. You'll find my comprehensive course notes, which also serve as cheat sheets for the eJPTv2 course. T…☆106Aug 24, 2025Updated 7 months ago
- Fuzzy-find your tags!☆18Aug 31, 2023Updated 2 years ago
- ☆22Jan 28, 2025Updated last year
- Blank methodology sheet for the OSWE exam☆13Dec 17, 2021Updated 4 years ago
- Python script to get Samba Server Version☆11May 8, 2018Updated 7 years ago
- Backdoor that leverages Nmap with setuid permissions to execute commands as root through a Lua-loaded C library☆53Oct 28, 2025Updated 5 months ago
- ☆26Jun 2, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A LKM (Loadable Kernel Module) to execute a command as root; I include a example of using netcat and a compiled(with source and steps on…☆16Oct 8, 2024Updated last year
- ☆22Oct 30, 2022Updated 3 years ago
- FULL v0, Cursor, Manus, Same.dev, Lovable, Devin, Replit Agent, Windsurf Agent, VSCode Agent, Dia Browser & Trae AI (And other Open Sourc…☆17May 31, 2025Updated 9 months ago
- You can gather useful information accounts by username across all types networks ( which also include social media)☆28Oct 19, 2023Updated 2 years ago
- ☆11Jul 15, 2021Updated 4 years ago
- Securing LLM's Against Top 10 OWASP Large Language Model Vulnerabilities 2024☆22May 10, 2024Updated last year
- This repository is only for tracking bugs and feature requests on LightOJ☆14Mar 9, 2026Updated 3 weeks ago
- U-Transkript is a powerful Python library for automatically extracting transcripts (subtitles) from YouTube videos and translating them i…☆13Feb 16, 2026Updated last month
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆25Jul 19, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Cloud-native portfolio platform powering bjornmelin.io. Demonstrates AWS solutions architecture through microservices, serverless APIs, a…☆21Mar 23, 2026Updated last week
- Passive Web Vulnerability Detection Tool☆37May 5, 2025Updated 10 months ago
- Below are some simple methods for exiting vim.☆20Sep 25, 2019Updated 6 years ago
- OWASP practice lab, just a few copy/pastes away. Fully stacked and ready to go with Docker☆21Oct 13, 2018Updated 7 years ago
- A Keylogger Made in Python. Tested on Windows, Linux. windows and linux executable payload generator. Screen shot and custom time delay. …☆16Sep 18, 2022Updated 3 years ago
- The powerfull Extract and Scanner Javascript urls (Upgrade Deeper search)☆21Nov 7, 2024Updated last year
- this my repo with notes i take in penetration testing☆29Feb 14, 2026Updated last month