Cyber-Jarvis is a versatile AI assistant for automation and cybersecurity. It handles tasks like playing videos, detecting objects, performing OSINT, scanning for vulnerabilities, cracking hashes, steganography, and AI jailbreak. Integrates various tools for enhanced digital management and security.
☆16Aug 20, 2025Updated 8 months ago
Alternatives and similar repositories for Cyber-Jarvis
Users that are interested in Cyber-Jarvis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A sophisticated GUI tool for creating malicious RAR archives that exploit the WinRAR path traversal vulnerability (CVE-2025-8088) using A…☆29Sep 4, 2025Updated 8 months ago
- Custom rules by cyclone☆16Dec 12, 2025Updated 4 months ago
- Just dots☆17May 31, 2025Updated 11 months ago
- A fully public exploit of the CVE-2020-0022 BlueFrag Android RCE Vulnerability (tested on Pixel 3 XL)☆22Nov 21, 2023Updated 2 years ago
- "ACCESS LIST" Bypass collections used during pentesting, gathered in one place. The list types include tools, usernames, passwords, comb…☆43Feb 19, 2026Updated 2 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- This Python tool uses PimEyes for reverse image searches, returning links to pages where matches are found, useful for investigations and…☆13Sep 12, 2024Updated last year
- A script to automate the creation of cloud infrastructure for hash cracking.☆15Sep 4, 2019Updated 6 years ago
- Diving into Popularity of GitHub Repositories☆13Sep 15, 2023Updated 2 years ago
- Simplified version of a common crawl fetcher☆17Dec 24, 2025Updated 4 months ago
- Nix Package Tool. A (humble) successor to linux's apt, which makes life easier when using nix as a package manager.☆29May 1, 2026Updated last week
- Username recon OSINT. Accurate hits! New sites to check, Simple and powerful tool. Goverments use this tool or similar tools built in dif…☆18Feb 19, 2026Updated 2 months ago
- ☆19Jul 25, 2025Updated 9 months ago
- Simple tool for exploiting JWT vulnerabilities☆14Dec 1, 2025Updated 5 months ago
- VK face grabber☆12Oct 12, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- download higher resolution photo from vk.com☆10Aug 30, 2021Updated 4 years ago
- 📥 AI OSINT - Capture, download, and enjoy.☆34Sep 23, 2025Updated 7 months ago
- 🧠 Using large language models to classify dark net documents in a zero-shot learning enviornments.☆22Apr 1, 2022Updated 4 years ago
- ☆24Updated this week
- Socks5 & Socks4 & HTTPS IP:PORT proxy list are updated occasionally. Proxy list source links & API links☆13Apr 7, 2025Updated last year
- NetHawk 🦅: An educational PoC combining 🤖 generative AI with 🛡️ ethical hacking and 🔍 network vulnerability assessment. Simplifying s…☆43May 25, 2025Updated 11 months ago
- ClawPuter — pixel desktop companion for M5Stack Cardputer (ESP32-S3). AI chat, voice input, real-time weather, synced macOS desktop pet.☆116Mar 19, 2026Updated last month
- ☆17Feb 7, 2026Updated 3 months ago
- A simple python script to download leaked databases from emo's breachforums CDN mirror☆18Oct 22, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Materials for the course Principles of AI: LLMs at UPenn (Stat 9911, Spring 2025). LLM architectures, training paradigms (pre- and post-t…☆45Jun 14, 2025Updated 10 months ago
- Bitrix vulnerability scanner☆23Mar 28, 2023Updated 3 years ago
- ☆13Oct 31, 2022Updated 3 years ago
- Tool to parse Stealer Logs.☆20Aug 2, 2023Updated 2 years ago
- XSSMaze is a web service designed to test and improve the performance of security testing tools by providing various cases of XSS vulnera…☆32Updated this week
- 📷- Bruteforce attack for Instagram & Common User Passwords Profiler (CUPP) 2022☆11Sep 10, 2022Updated 3 years ago
- DepthSearch is a deep web OSINT tool that enables powerful, anonymous searches across deep web search engines. It features proxy support,…☆25Oct 26, 2024Updated last year
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- Documentation for Snusbase and the Snusbase API.☆23Feb 8, 2026Updated 3 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A ServiceWorker for client-side reconstruction of composite mementos☆15Mar 6, 2025Updated last year
- Web testing application.☆16Aug 26, 2024Updated last year
- A tool to check the correctness of email and password☆21Feb 26, 2024Updated 2 years ago
- 🔠 A CAPTCHA solver using machine learning with a bidirectional LSTM model☆23Jan 26, 2023Updated 3 years ago
- Scripts created by AI Agents to use as tools for data collection. These are examples of Inforensics JITT (Just-In-Time Tool) Agent.☆15Jul 7, 2024Updated last year
- OOB listener powered by cloudflare workers☆12Apr 13, 2025Updated last year
- A Collection of Wordlists for Penetration Testing☆38Mar 13, 2026Updated last month