jthack / hero
a hackbot proof-of-concept
☆37Updated 11 months ago
Alternatives and similar repositories for hero:
Users that are interested in hero are comparing it to the libraries listed below
- Nuclei plugins to audit Chrome extensions☆64Updated 6 months ago
- Build a CVE library with aggregated CISA, EPSS and CVSS data☆27Updated last year
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆72Updated 11 months ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆33Updated 2 months ago
- Modular web-application honeypot platform built using go and gin☆55Updated 9 months ago
- Hijack a slack bot to phish your way in☆48Updated last month
- Stalker, the Extensible Attack Surface Management tool.☆80Updated this week
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interesting…☆45Updated 6 months ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year
- Semgrep-based Policy Controller for Kubernetes☆46Updated this week
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆78Updated 6 months ago
- EZGHSA is a command-line tool for summarizing and filtering vulnerability alerts on Github repositories.☆35Updated last month
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆69Updated this week
- LLM Testing Findings Templates☆66Updated last year
- Additional active scan checks for BURP☆26Updated 4 months ago
- A blazing-fast, thread-safe, straightforward and zero memory allocations tool to swiftly generate alternative IP(v4) address representati…☆85Updated last year
- Do bulk whois lookups and get alerted on domains of interest.☆24Updated 6 months ago
- A cybersecurity tool designed to safeguard against IDN Homograph Attacks☆36Updated 2 months ago
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINT☆38Updated 11 months ago
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆28Updated 3 weeks ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆49Updated 3 months ago
- ☆16Updated 3 months ago
- Tool for obfuscating and deobfuscating data.☆67Updated 10 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆47Updated 4 months ago
- A Bug Bounty Platform that allows hunters to issue commands over a geo-distributed cluster. The ideal user is someone who is attempting t…☆47Updated 4 months ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆40Updated last year
- Simple PoC for demonstrating Race Conditions on Websockets☆56Updated last year
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated 4 months ago