HexSecGPT is designed to provide powerful, unrestricted, and seamless AI-driven conversations, pushing the boundaries of what is possible with natural language processing.
☆192Jan 31, 2026Updated last month
Alternatives and similar repositories for HexSecGPT
Users that are interested in HexSecGPT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- WormGPT CLI is a sleek command-line interface (CLI) for interacting with LLMs via OpenRouter API. It supports multiple models, automatic …☆210Jan 31, 2026Updated last month
- Convert any executable (RAT, keylogger, botnet, meterpreter, anything) into raw shellcode and run it stealthily from memory using a custo…☆39May 11, 2025Updated 10 months ago
- ☆339Updated this week
- HackTheWeb is a production-ready, AI-powered web application penetration testing tool designed for security professionals and ethical hac…☆33Oct 5, 2025Updated 5 months ago
- AutoPentestX – Automated Pentesting & Vulnerability Reporting Tool☆1,031Feb 2, 2026Updated last month
- The main purpose is to generate custom wordlists based on user-provided info (name, surname, nickname, team, date of birth, etc.). The to…☆34Aug 19, 2025Updated 7 months ago
- ☆29Jan 19, 2026Updated 2 months ago
- Interactive XSS Labs to get into Client-Side Hacking☆78Feb 25, 2026Updated 3 weeks ago
- COPG-VD is a module designed for global device spoofing. This means even system apps and the whole device will be hooked.☆51Feb 14, 2026Updated last month
- ☆33Sep 21, 2024Updated last year
- ☆28Mar 24, 2023Updated 2 years ago
- ☆22Jun 24, 2024Updated last year
- WhatsApp Web phishing page for authorized pentesting. Captures international phone numbers + OTP codes with pixel-perfect 2026 UI. Real-t…☆39Mar 6, 2026Updated 2 weeks ago
- X-brute is a tool designed to perform brute force using auto tor to trick the system so that it can continue to run and perform brute for…☆21Jan 7, 2026Updated 2 months ago
- CTI Cyber Threat Intelligence OSINT Dark Web Deep Web Research. Ransomware gang information gathering tool.☆142Dec 19, 2025Updated 3 months ago
- Tutorial Dasar Codeigniter☆13Oct 3, 2019Updated 6 years ago
- ☆12Mar 8, 2025Updated last year
- ☆13Nov 24, 2021Updated 4 years ago
- A DuckyScript 3 implementation targeting Raspberry pico☆17Oct 10, 2025Updated 5 months ago
- Highly performant layer7 DoS tool☆15Sep 14, 2025Updated 6 months ago
- this tool created for ethical purpose , and it is perfectly working so take care when you use it☆14Sep 26, 2023Updated 2 years ago
- An advanced networking tool for penetration testing... A place where floats and integers always win.☆31Aug 18, 2025Updated 7 months ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆21Dec 14, 2023Updated 2 years ago
- Rdio Scanner is an open source software that ingest and distribute audio files generated by various software-defined radio recorders. Its…☆33Apr 6, 2022Updated 3 years ago
- A dynamic, Flask-based web application providing a centralized interface for executing various open-source intelligence (OSINT) and cyber…☆43Sep 19, 2025Updated 6 months ago
- Grafana scanner with all public CVEs that I collected in one script to make grafana testing easier☆72Feb 15, 2026Updated last month
- Fuzz 403/401ing endpoints for bypasses☆10Aug 14, 2020Updated 5 years ago
- Metasploit-AI is a cutting-edge cybersecurity framework that combines the power of Metasploit with advanced artificial intelligence and m…☆50Aug 9, 2025Updated 7 months ago
- This tool is used to hack microphone of target device.☆35Mar 15, 2026Updated last week
- Sender otp massive on termux☆35Mar 14, 2026Updated last week
- A ready-to-deploy static web app template and tutorial☆25Jun 13, 2017Updated 8 years ago
- A suite of WiFi/Bluetooth offensive and defensive tools for the ESP32☆16Feb 24, 2025Updated last year
- The CAN Injection Toolkit☆327Apr 20, 2025Updated 11 months ago
- This is a simulation of attack by (Voodoo Bear) APT group targeting entities in Eastern Europe the attack campaign was active as early as…☆12Jun 19, 2024Updated last year
- A curated list of awesome warez and piracy links☆13May 1, 2019Updated 6 years ago
- Mac configuration☆14Feb 26, 2026Updated 3 weeks ago
- Atonomi Device SDK for validating devices on the Atonomi Network☆11Feb 19, 2021Updated 5 years ago
- An automatic tool to report propganda's videos easily.☆13Mar 22, 2021Updated 5 years ago
- Python Exploitation Framework☆38Mar 9, 2026Updated 2 weeks ago