Multi-Agent System for Automated Penetration Testing (MASAPT)
☆30Dec 22, 2021Updated 4 years ago
Alternatives and similar repositories for MASAPT
Users that are interested in MASAPT are comparing it to the libraries listed below
Sorting:
- Application for detecting command and control (C2) communication through network traffic analysis.☆15May 12, 2023Updated 2 years ago
- AMC (Automatic Media Access Control [MAC] Address Spoofing tool), Helps you to protect your real network hardware identity. Each entered …☆22Nov 22, 2024Updated last year
- Script en Bash que automatiza todos los pasos para retransmitir la solicitud de autenticación SMB con el objetivo de obtener una Shell.☆23Jul 16, 2025Updated 8 months ago
- ☆31May 22, 2024Updated last year
- [Discontinued] Transform your payload into fake powerpoint (.ppt)☆42Dec 2, 2020Updated 5 years ago
- A System-Oriented Wargame Framework for Adversarial ML☆10Apr 24, 2023Updated 2 years ago
- A 2d javaScript game built without any libraries☆10Oct 30, 2022Updated 3 years ago
- Shellcode execution via x86 inline assembly based on MSVC syntax☆17Apr 26, 2023Updated 2 years ago
- Parse scan results into python objects, i.e. Nessus, Nmap, testssl, metasploit, ...☆23Jan 4, 2020Updated 6 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆33Apr 15, 2021Updated 4 years ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- Sample app showing delegated authentication☆11Jun 4, 2019Updated 6 years ago
- The objective of Smart File Hunter (SFH) is the efficient identification of files containing sensitive information like passwords or priv…☆14Sep 3, 2022Updated 3 years ago
- zkSnark circuit compiler☆12Feb 19, 2026Updated last month
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- This repository stores all of the OLCF game of life tutorials☆15Dec 5, 2019Updated 6 years ago
- A Formal Verification of Algorithm W☆17Mar 10, 2021Updated 5 years ago
- Fully functional & encrypted chat-application.☆11Mar 28, 2024Updated last year
- Herramienta para generar virus programada en python☆29Dec 29, 2021Updated 4 years ago
- 🚀 Backend mastery with Node.js — from fundamentals to advanced concepts, including authentication, databases, security, real-world proje…☆20Dec 16, 2025Updated 3 months ago
- AI-VAPT is an autonomous AI-driven Vulnerability Assessment & Penetration Testing framework combining traditional VAPT with neural intell…☆88Oct 7, 2025Updated 5 months ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Mar 15, 2022Updated 4 years ago
- fastjson全版本漏洞利用工具,只支持POST☆10Jan 5, 2021Updated 5 years ago
- Collection of the cheat sheets useful for pentesting☆10May 11, 2018Updated 7 years ago
- Python resource library for creating security related tooling☆79Jul 11, 2024Updated last year
- Tidy autoregressive inference in JAX☆15Sep 1, 2025Updated 6 months ago
- It's a simple tool for test vulnerability shellshock☆119Mar 18, 2021Updated 5 years ago
- Opencart Bruteforce and Upload Image☆11Aug 13, 2019Updated 6 years ago
- Artemis Academy capstone project☆10Sep 10, 2022Updated 3 years ago
- exploit-database-papers☆13Nov 27, 2017Updated 8 years ago
- Experimental python3.x based ICMP bind shell listener using scapy and windows 'compatible'☆10May 29, 2020Updated 5 years ago
- Use current thread token to execute command☆15Jan 27, 2021Updated 5 years ago
- How to hack webcams☆10Jan 7, 2022Updated 4 years ago
- A better way to write shell code☆11May 28, 2021Updated 4 years ago
- A Secure-ish Crypto Execution Module☆16Jun 22, 2022Updated 3 years ago
- V-MPO torch version with DMLab30 and GTrXL☆13Mar 1, 2021Updated 5 years ago
- A Modern Approach☆10Sep 5, 2015Updated 10 years ago
- ☆12Aug 1, 2023Updated 2 years ago
- Collection of exploits that were verified by an automated system☆13Jun 17, 2021Updated 4 years ago