kamakauzy / graphql-hunterLinks
Let's make quick work of GraphQL instances ;)
☆21Updated last month
Alternatives and similar repositories for graphql-hunter
Users that are interested in graphql-hunter are comparing it to the libraries listed below
Sorting:
- Custom Google search engine dedicated to IT security & hacking stuff. Over 240 high-quality sources.☆75Updated 2 weeks ago
- CyberFind — a next-generation OSINT reconnaissance tool designed for cybersecurity professionals, penetration testers, and digital invest…☆50Updated last week
- An open-source self-hosted purple team management web application.☆25Updated last month
- IP Rotation from different providers - Like FireProx but for GCP, Azure, Alibaba and CloudFlare☆263Updated last month
- Ludus FastMCP enables AI-powered management of Ludus cyber ranges through natural language commands. The server exposes **157 tools** acr…☆68Updated 3 weeks ago
- 🔒 Modern C2 Platform with Cloudflare Tunnel Integration | WinRM & SSH Remote Management | Real-time Terminal & Remote Desktop | Built wi…☆89Updated last month
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆275Updated 2 weeks ago
- Extracts browser-stored data such as refresh tokens, cookies, saved credentials, credit cards, autofill entries, browsing history, and bo…☆367Updated last week
- Advanced JavaScript File Discovery and Analysis Tool☆179Updated 2 months ago
- ☆185Updated 2 months ago
- Extract data from modern Chrome versions, including refresh tokens, cookies, saved credentials, autofill data, browsing history, and book…☆540Updated 3 weeks ago
- AI-powered subdomain enumeration tool with local LLM analysis via Ollama - 100% private, zero API costs☆359Updated 2 months ago
- ☆340Updated this week
- A user-mode code and its rootkit that will Kill EDR Processes permanently by leveraging the power of Process Creation Blocking Kernel Cal…☆254Updated 7 months ago
- 🛡️ Detect and respond to security threats in real-time with God-Eye, an AI-driven tool designed for privacy and local deployment on mult…☆38Updated this week
- Powerful LLM Query Framework with YAML Prompt Templates. Made for Automation☆34Updated 4 months ago
- Red Team tools containerized☆74Updated last month
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆44Updated 9 months ago
- This repository consists of extensions, that hacktron uses to execute specific workflows in CLI.☆80Updated last month
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆165Updated 5 months ago
- A visual methodology tracking platform tailored for offensive security assessments☆238Updated 4 months ago
- ☆282Updated last month
- Automated red-team toolkit for stress-testing LLM defences - Vector Attacks on LLMs (Gendalf Case Study)☆109Updated 6 months ago
- LLMON 🍋 - The World's First Web Adversarial AI Firewall☆39Updated 3 weeks ago
- This is a local search engine to search for cybersecurity tools. It has 3000+ tools in it's database.☆194Updated 3 months ago
- SilentButDeadly is a network communication blocker specifically designed to neutralize EDR/AV software by preventing their cloud connecti…☆431Updated 2 months ago
- Aliasr is a modern, feature-rich TUI launcher for penetration testing commands inspired by Arsenal, but with significantly improved funct…☆78Updated this week
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆129Updated 10 months ago
- ☆55Updated 2 months ago
- Group Policy Objects manipulation and exploitation framework☆286Updated last month