mazen160 / shenninaView external linksLinks
Automating Host Exploitation with AI
☆547Nov 8, 2022Updated 3 years ago
Alternatives and similar repositories for shennina
Users that are interested in shennina are comparing it to the libraries listed below
Sorting:
- Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules…☆5,956Jul 12, 2024Updated last year
- Neton is a tool for getting information from Internet connected sandboxes☆96Nov 15, 2022Updated 3 years ago
- A Burp Suite extension to add OpenAI (GPT) on Burp and help you with your Bug Bounty recon to discover endpoints, params, URLs, subdomain…☆886May 3, 2023Updated 2 years ago
- The SteaLinG is an open-source penetration testing framework designed for social engineering☆240Jul 3, 2024Updated last year
- Check your WAF before an attacker does☆1,462Jul 17, 2025Updated 7 months ago
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Feb 15, 2024Updated 2 years ago
- Adversary simulation and Red teaming platform with AI☆4,951Jan 18, 2026Updated 3 weeks ago
- 一个GitHub监控和信息收集工具,支持监控和收集CVE、免杀、漏洞利用等内置关键字和自定义关键字。☆355Jul 25, 2024Updated last year
- ☆160Nov 26, 2023Updated 2 years ago
- RevSuit is a flexible and powerful reverse connection platform designed for receiving connection from target host in penetration.☆561Jun 1, 2023Updated 2 years ago
- The Havoc Framework☆8,158Dec 18, 2025Updated last month
- PowerShell Clipboard Data Transfer☆73Dec 29, 2025Updated last month
- Pentesting automation platform that combines hacking tools to complete assessments☆520Updated this week
- Afuzz is an automated web path fuzzing tool for the Bug Bounty projects.☆311Jul 15, 2023Updated 2 years ago
- Standalone utility for service discovery on open ports!☆690Jan 13, 2026Updated last month
- Uses ChatGPT API, Bard API, and Llama2, Python-Nmap, DNS Recon, PCAP and JWT recon modules and uses the GPT3 model to create vulnerabilit…☆591Nov 9, 2024Updated last year
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆119Jul 6, 2024Updated last year
- ☆30Jul 28, 2024Updated last year
- Adversary Emulation Framework☆10,673Feb 8, 2026Updated last week
- Asset discovery and identification tools 快速识别 Web 指纹信息,定位资产类型。辅助红队快速定位目标资产信息,辅助蓝队发现疑似脆弱点☆2,137Jan 29, 2024Updated 2 years ago
- A simple tool for bypassing file upload restrictions.☆892Jul 22, 2024Updated last year
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via E…☆8,464Nov 16, 2025Updated 3 months ago
- A Modern Orchestration Engine for Security☆6,096Feb 10, 2026Updated last week
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆973Jan 12, 2024Updated 2 years ago
- An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws☆3,909Oct 4, 2025Updated 4 months ago
- Open source C2 server created for stealth red team operations☆838Sep 26, 2022Updated 3 years ago
- Cloud Exploit Framework☆112May 11, 2022Updated 3 years ago
- a lightweight, flexible and novel open source poc verification framework☆237May 21, 2022Updated 3 years ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆738May 19, 2023Updated 2 years ago
- RedGuard is a C2 front flow control tool,Can avoid Blue Teams,AVs,EDRs check.☆1,562Aug 20, 2024Updated last year
- A Security Tool for Bug Bounty, Pentest and Red Teaming.☆4,177Feb 9, 2026Updated last week
- A Burp Suite extension that integrates OpenAI's GPT to perform an additional passive scan for discovering highly bespoke vulnerabilities …☆2,271Jun 9, 2024Updated last year
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆448Nov 2, 2023Updated 2 years ago
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆151Dec 26, 2023Updated 2 years ago
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆1,232Aug 18, 2023Updated 2 years ago
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,400Nov 7, 2024Updated last year
- Windows offline filesystem hacking tool for Linux☆96Jun 24, 2022Updated 3 years ago
- An XSS exploitation command-line interface and payload generator.☆1,415Jan 19, 2025Updated last year
- The most powerful CRLF injection (HTTP Response Splitting) scanner.☆593Oct 17, 2023Updated 2 years ago