A computer programming AI bot in python django
☆56Mar 28, 2024Updated last year
Alternatives and similar repositories for WOLFGPT
Users that are interested in WOLFGPT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆17Jun 11, 2023Updated 2 years ago
- Fast subdomains enumeration tool for penetration testers☆14Feb 3, 2020Updated 6 years ago
- make virus without coding☆12Apr 7, 2020Updated 5 years ago
- Inject scripted keystrokes and mouse movements into remote desktop sessions, including VMware View, Amazon Workspaces, and Microsoft RDP.…☆16Jul 25, 2014Updated 11 years ago
- Automate bug bounty recon using bash alias☆15Aug 6, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Agentic Pentesting MCP server that discovers, exploits, and reports web application vulnerabilities.☆41Feb 22, 2026Updated last month
- LightCC is a Python package that validates and retrieves details about credit card numbers using binlist.io API. It uses libraries like p…☆15Apr 26, 2023Updated 2 years ago
- Archive of publicly available threat INTel reports (mostly APT Reports but not limited to).☆11Sep 30, 2018Updated 7 years ago
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆14Jan 24, 2021Updated 5 years ago
- ☆18Mar 22, 2021Updated 5 years ago
- 一款强大的内网信息收集工具,支持文件、文件夹、文件内容、命令、注册表、进程、mimikatz命令、dpapi、最近访问收集,且支持定制化配置,只需更新配置文件,定义收集规则,即可开启对各类浏览器、remote工具、聊天软件进行凭据、信息收集☆22Oct 16, 2022Updated 3 years ago
- QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login…☆13Sep 27, 2016Updated 9 years ago
- Automation for GoPhish internal phishing campaigns.☆20Jan 24, 2022Updated 4 years ago
- ☆12Apr 3, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Ivanti Pulse Secure CVE-2023-46805 Scanner - Based on Assetnote's Research☆13Jan 19, 2024Updated 2 years ago
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15May 23, 2023Updated 2 years ago
- The Best DDoS Attack Tool + Bypass Cloud Flare CDN For Priv8☆19Oct 14, 2025Updated 5 months ago
- Hack for RUHacks☆19May 27, 2018Updated 7 years ago
- OpenSSH 7.7 - Username Enumeration☆17Oct 23, 2020Updated 5 years ago
- Crack Everything for CrackMapExec version 6☆22Jul 1, 2024Updated last year
- An automated scanning, enumeration, and note taking tool for pentesters☆13Jul 26, 2022Updated 3 years ago
- The Cayosin Bot features unique RHex STD and RHex HTTP attacks. Meaning that the Hex Strings are randomly selected. Cayosin also contains…☆15Sep 29, 2020Updated 5 years ago
- Jenkins Security Research or Hacking Jenkins ;)☆12Dec 10, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- simple program for joomla CVE-2023-23752 scanner for pentesting and educational purpose☆17Feb 24, 2023Updated 3 years ago
- Brute force attack on twitter☆41Jun 11, 2019Updated 6 years ago
- Burp Suite plugin that adds additional checks to the passive scanner to reveal the origin IP(s) of Cloudflare-protected web applications.☆62Nov 29, 2022Updated 3 years ago
- A Tool For FACEBOOK Phishing From Termux No Root☆58Sep 27, 2020Updated 5 years ago
- CiLocks | Android/IOS Hacking 📱 Crack Interface lockscreen, Metasploit and More Android/IOS Hacking☆29Jan 31, 2023Updated 3 years ago
- LXANCEPHISHER, An automated phishing tool with 30+ templates. This Tool is made for educational purpose only ! Author will not be respons…☆22Jan 15, 2025Updated last year
- Virus Repository☆28Jan 2, 2022Updated 4 years ago
- Unauthenticated Remote Code Execution in SPIP versions up to and including 4.2.12☆13Aug 12, 2024Updated last year
- How to install Kali in VirtualBox☆14May 3, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Offensive V Programming☆18Nov 3, 2021Updated 4 years ago
- programmatic control of the mouse☆16Jun 28, 2023Updated 2 years ago
- Example crypter is a project demonstrating how files can be encrypted and injected into memory using a stub file.☆17Oct 10, 2016Updated 9 years ago
- ☆30Sep 19, 2025Updated 6 months ago
- Android Hacking Over Wan☆23Dec 23, 2019Updated 6 years ago
- simple bash script to earn bounties☆36Apr 27, 2024Updated last year
- ☆13Apr 14, 2024Updated last year