huntoai / phishing-ai-agentLinks
Red-Team - AI Agent to Phish Employees based on Social Intelligence.
☆22Updated last month
Alternatives and similar repositories for phishing-ai-agent
Users that are interested in phishing-ai-agent are comparing it to the libraries listed below
Sorting:
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆37Updated last year
- A simple web app to get the latest EPSS data for a CVE ID☆12Updated last month
- ☆20Updated 9 months ago
- A growing collection of MCP servers bringing offensive security tools to AI assistants. Nmap, Ghidra, Nuclei, SQLMap, Hashcat and more.☆205Updated this week
- Palo Alto Networks AI Runtime Security Model Context Protocol (MCP) Relay Server☆30Updated this week
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆41Updated 2 months ago
- Proof of Concepts for malicious maintainers: How to Tamper with Releases built with GitHub Actions Worfklows, presented at fwd:cloudsec E…☆77Updated 4 months ago
- A Model Context Protocol server that connects AI assistants like Claude to AWS security services, allowing them to autonomously query, in…☆80Updated 6 months ago
- A tool for folks who `git clone` first and ask questions later☆65Updated 4 months ago
- AI / LLM Red Team Field Manual & Consultant’s Handbook☆229Updated this week
- A PoC to Simulate Ransomware Attack on AWS Environment☆32Updated last year
- ☆186Updated 2 months ago
- ☆82Updated 5 months ago
- Purple-team telemetry & simulation toolkit.☆107Updated last month
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated last year
- ☆89Updated 2 months ago
- Nova-Proximity is a MCP and Agent Skills security scanner powered with NOVA☆273Updated this week
- EvilMist is a collection of scripts and utilities designed to support cloud penetration testing & red teaming. The toolkit helps identify…☆87Updated this week
- ☆23Updated 10 months ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆59Updated 6 months ago
- A tool to help pentesters quickly identify privileged principals and second-order privilege escalation opportunities in unfamiliar AWS ac…☆138Updated 2 months ago
- A GitHub Actions Supply Chain CTF / Goat☆27Updated 3 weeks ago
- Automated vulnerability discovery and annotation☆68Updated last year
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Updated last year
- A comprehensive security scanner for Model Context Protocol (MCP) servers that detects vulnerabilities and security issues in your MCP se…☆120Updated last month
- ☆58Updated last month
- 🌐 Visualize and explore IaC ✒️ Create and share notes in VS Code 🤝 Sync notes and findings in real-time with friends☆73Updated last year
- ☆40Updated 2 months ago
- Red Teaming for AI and Cloud☆206Updated last month
- An AWS IAM Privilege Escalation Path Library☆112Updated 2 weeks ago