kamakauzy / graphql-hunterLinks
Let's make quick work of GraphQL instances ;)
☆18Updated last week
Alternatives and similar repositories for graphql-hunter
Users that are interested in graphql-hunter are comparing it to the libraries listed below
Sorting:
- An open-source self-hosted purple team management web application.☆25Updated 3 weeks ago
- CyberFind — a next-generation OSINT reconnaissance tool designed for cybersecurity professionals, penetration testers, and digital invest…☆34Updated last week
- AI-powered subdomain enumeration tool with local LLM analysis via Ollama - 100% private, zero API costs☆182Updated last month
- Advanced JavaScript File Discovery and Analysis Tool☆175Updated last month
- 🛡️ Detect and respond to security threats in real-time with God-Eye, an AI-driven tool designed for privacy and local deployment on mult…☆38Updated this week
- A new tool to exploit automatically bad configurations in Active Directory with BloodHound json files☆59Updated 3 weeks ago
- IP Rotation from different providers - Like FireProx but for GCP, Azure, Alibaba and CloudFlare☆249Updated 2 weeks ago
- JWT Auditor – Analyze, break, and understand your tokens like a pro.☆303Updated last week
- Automated red-team toolkit for stress-testing LLM defences - Vector Attacks on LLMs (Gendalf Case Study)☆107Updated 5 months ago
- CF GeoBypasser Cyberpunk Framework is a Modular Offensive Toolkit designed to discover and bypass Cloudflare-based Geo-restrictions using…☆44Updated 3 weeks ago
- Ludus FastMCP enables AI-powered management of Ludus cyber ranges through natural language commands. The server exposes **157 tools** acr…☆58Updated last week
- Guardian is a production-ready AI-powered penetration testing automation CLI tool that leverages Google Gemini and LangChain to orchestra…☆207Updated last week
- Use Cloudflare to create HTTP pass-through proxies for unique IP rotation, similar to fireprox☆722Updated last month
- ☆186Updated last month
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆43Updated 8 months ago
- Red Team tools containerized☆74Updated 3 weeks ago
- MITM proxy for TCP/TLS/DTLS/UDP traffic, with STARTTLS, IoT, Thick Client and more.☆610Updated 3 weeks ago
- This repository consists of extensions, that hacktron uses to execute specific workflows in CLI.☆59Updated this week
- This is a local search engine to search for cybersecurity tools. It has 3000+ tools in it's database.☆124Updated 3 months ago
- A tool to create HTTPS reverse tunnels☆187Updated 3 weeks ago
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆213Updated last week
- A visual methodology tracking platform tailored for offensive security assessments☆235Updated 3 months ago
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆80Updated 3 months ago
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.☆157Updated last month
- one-for-all llm powered, passive & active subdomain enumeration tool☆88Updated last month
- ATHF is a framework for agentic threat hunting - building systems that can remember, learn, and act with increasing autonomy.☆134Updated 2 weeks ago
- Powerful LLM Query Framework with YAML Prompt Templates. Made for Automation☆35Updated 3 months ago
- LLMON 🍋 - The World's First Web Adversarial AI Firewall☆24Updated last week
- Intelligent caching proxy for web scraping with SSL bumping, upstream proxy routing, and a web-based management interface.☆27Updated last week
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆426Updated 2 months ago