mazen160 / shenninaLinks
Automating Host Exploitation with AI
☆540Updated 2 years ago
Alternatives and similar repositories for shennina
Users that are interested in shennina are comparing it to the libraries listed below
Sorting:
- RedGuard is a C2 front flow control tool,Can avoid Blue Teams,AVs,EDRs check.☆1,513Updated last year
- ☆580Updated 2 months ago
- Black Hat Asia 2023 PDF Public☆575Updated 2 years ago
- TOP All bugbounty pentesting CVE-2023- POC Exp RCE example payload Things☆703Updated last week
- A python script to scan for Apache Tomcat server vulnerabilities.☆848Updated 2 weeks ago
- A proof of concept exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager☆354Updated 2 years ago
- A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions☆481Updated 2 years ago
- Multiplatform Python WebShell☆319Updated 11 months ago
- The FOFA Library collects usage tips, common scenarios, F&Q, and more for FOFA.☆300Updated last month
- EPSS & VEDAS Score Aggregator for CVEs☆250Updated this week
- PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.☆437Updated last year
- GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsof…☆614Updated 4 months ago
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆532Updated last year
- An XSS Exploitation Tool☆317Updated 2 months ago
- Script for generating revshells☆476Updated 11 months ago
- https://cve.mitre.org/☆161Updated this week
- Pre-Built Vulnerable Multiple API Scenarios Environments Based on Docker-Compose.☆411Updated 3 years ago
- Nuclei AI - Browser Extension for Rapid Nuclei Template Generation☆529Updated 8 months ago
- Totally Insecure Web Application Project (TIWAP)☆174Updated last year
- A tool for creating hidden accounts using the registry || 一个使用注册表创建隐藏帐户的工具☆478Updated 3 years ago
- Pentesting automation platform that combines hacking tools to complete assessments☆502Updated last week
- a lightweight, flexible and novel open source poc verification framework☆237Updated 3 years ago
- mip22 is a advanced phishing tool☆630Updated last year
- This Python script can be used to bypass IP source restrictions using HTTP headers.☆395Updated 6 months ago
- Command & Control-Framework created for collaboration in python3☆318Updated 2 years ago
- Asset discovery and identification tools 快速识别 Web 指纹信息,定位资产类型。辅助红队快速定位目标资产信息,辅助蓝队发现疑似脆弱点☆2,122Updated last year
- Linux/Windows post-exploitation framework made by linux user☆1,611Updated 2 months ago
- Uses ChatGPT API, Bard API, and Llama2, Python-Nmap, DNS Recon, PCAP and JWT recon modules and uses the GPT3 model to create vulnerabilit…☆583Updated 9 months ago
- A webshell that can bypass some system security, all code has been obfuscated to bypass malware scans freely.☆247Updated 9 months ago
- An XSS exploitation command-line interface and payload generator.☆1,390Updated 7 months ago