jthack / heroLinks
a hackbot proof-of-concept
☆39Updated last year
Alternatives and similar repositories for hero
Users that are interested in hero are comparing it to the libraries listed below
Sorting:
- Nuclei plugins to audit Chrome extensions☆64Updated 11 months ago
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆73Updated last year
- Autonomous AI C2☆31Updated 11 months ago
- Stalker, the Extensible Attack Surface Management tool.☆86Updated last week
- An LLM and OCR based Indicator of Compromise Extraction Tool☆33Updated 6 months ago
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINT☆37Updated last year
- Hijack a slack bot to phish your way in☆55Updated 2 months ago
- Modular web-application honeypot platform built using go and gin☆58Updated last year
- EZGHSA is a command-line tool for summarizing and filtering vulnerability alerts on Github repositories.☆35Updated 6 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated 8 months ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year
- Additional active scan checks for BURP☆27Updated 8 months ago
- InfoSec OpenAI Examples☆19Updated last year
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Updated 2 years ago
- ☆17Updated this week
- Damn Vulnerable Browser Extension (DVBE), previously named as Badly Coded Browser Extension (BCBE), is an open-source vulnerable Chrome E…☆24Updated 3 months ago
- Build a CVE library with aggregated CISA, EPSS and CVSS data☆27Updated last year
- BlueSky OSINT Tool☆14Updated 6 months ago
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆70Updated last week
- This is a RSS feed collection for all the InfoSec Content Creators☆32Updated last year
- 📚A curated list of product security resources.☆20Updated 2 weeks ago
- A cybersecurity tool designed to safeguard against IDN Homograph Attacks☆37Updated 7 months ago
- ReconPal: Leveraging NLP for Infosec☆56Updated 3 years ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆53Updated 3 months ago
- Pentester-focused Docker registry tool to enumerate and pull images☆21Updated 2 months ago
- This script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sub…☆86Updated 9 months ago
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆30Updated 5 months ago
- ☆36Updated 10 months ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆19Updated 2 years ago
- Collection of wordlists containing dangerous function calls in many languages☆50Updated last month