marzekan / MASAPT
Multi-Agent System for Automated Penetration Testing (MASAPT)
☆23Updated 3 years ago
Alternatives and similar repositories for MASAPT:
Users that are interested in MASAPT are comparing it to the libraries listed below
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- Listing of my writeups from HackTheBox, VulnHub, TryHackMe, others...☆20Updated 3 years ago
- SAIVS (Spider Artificial Intelligence Vulnerability Scanner).☆55Updated 4 years ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service and versions.☆16Updated this week
- Another vulnerability scanner☆17Updated last year
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆37Updated 2 years ago
- Site fast fuzzing with chorme extension.☆25Updated 2 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- Personnel scripts,projects notes,hacks,random thoughts,mindmap etc....☆30Updated 4 months ago
- Automated Google dorking with custom search engines☆26Updated 4 years ago
- Python script that automate the process of generating various reverse shells.☆16Updated 3 years ago
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guide☆20Updated 4 years ago
- Application for detecting command and control (C2) communication through network traffic analysis.☆14Updated last year
- Command and Control Framework☆14Updated 9 months ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆15Updated 3 years ago
- Collections of way to evade normal detection events.☆24Updated 4 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆15Updated 5 years ago
- Development of Botnet Detection Module for Traffic-Based IoT Devices Using Deep Learning☆13Updated 2 years ago
- Interactive Post Exploitation Tool☆36Updated 5 years ago
- Simple tools to handle string and generate subdomain permutations☆14Updated 2 years ago
- Jok3r - Network and Web Pentest Framework☆16Updated 5 years ago
- An MITM based Social Engineering (Phishing)attack POC!☆10Updated 10 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Updated 3 years ago
- Study into generating POC / Exploits for the metasploit framework using LLMs☆11Updated last year
- Based on shawarkhanethicalhacker/BruteXSS☆13Updated 5 years ago
- Automated Scanning, Pentesting , Exploiting and Reporting☆21Updated 3 years ago