mazen160 / shenninaLinks
Automating Host Exploitation with AI
☆540Updated 2 years ago
Alternatives and similar repositories for shennina
Users that are interested in shennina are comparing it to the libraries listed below
Sorting:
- RedGuard is a C2 front flow control tool,Can avoid Blue Teams,AVs,EDRs check.☆1,497Updated 11 months ago
- ☆537Updated last month
- Black Hat Asia 2023 PDF Public☆573Updated 2 years ago
- Multiplatform Python WebShell☆318Updated 10 months ago
- An XSS Exploitation Tool☆318Updated last month
- A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions☆482Updated 2 years ago
- EPSS & VEDAS Score Aggregator for CVEs☆247Updated last week
- AutoPentest-DRL: Automated Penetration Testing Using Deep Reinforcement Learning☆370Updated 3 years ago
- A proof of concept exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager☆355Updated 2 years ago
- TOP All bugbounty pentesting CVE-2023- POC Exp RCE example payload Things☆701Updated this week
- ☆1,550Updated last week
- PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.☆435Updated last year
- A python script to scan for Apache Tomcat server vulnerabilities.☆847Updated 2 weeks ago
- Nuclei plugin for BurpSuite☆1,278Updated 10 months ago
- https://cve.mitre.org/☆156Updated this week
- Uses ChatGPT API, Bard API, and Llama2, Python-Nmap, DNS Recon, PCAP and JWT recon modules and uses the GPT3 model to create vulnerabilit…☆562Updated 8 months ago
- Asset discovery and identification tools 快速识别 Web 指纹信息,定位资产类型。辅助红队快速定位目标资产信息,辅助蓝队发现疑似脆弱点☆2,109Updated last year
- A Burp Suite extension that integrates OpenAI's GPT to perform an additional passive scan for discovering highly bespoke vulnerabilities …☆2,167Updated last year
- Pre-Built Vulnerable Multiple API Scenarios Environments Based on Docker-Compose.☆409Updated 2 years ago
- A webshell that can bypass some system security, all code has been obfuscated to bypass malware scans freely.☆246Updated 8 months ago
- The FOFA Library collects usage tips, common scenarios, F&Q, and more for FOFA.☆295Updated 3 weeks ago
- A tool for creating hidden accounts using the registry || 一个使用注册表创建隐藏帐户的工具☆476Updated 3 years ago
- An XSS exploitation command-line interface and payload generator.☆1,388Updated 6 months ago
- a lightweight, flexible and novel open source poc verification framework☆237Updated 3 years ago
- A fully automated, reliable, and accurate scanner for finding Spring4Shell and Spring Cloud RCE vulnerabilities☆660Updated 3 years ago
- Linux/Windows post-exploitation framework made by linux user☆1,597Updated last month
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆531Updated last year
- Nuclei AI - Browser Extension for Rapid Nuclei Template Generation☆523Updated 7 months ago
- Script for generating revshells☆476Updated 10 months ago
- Vcenter综合渗透利用工具包 | Vcenter Comprehensive Penetration and Exploitation Toolkit☆1,156Updated 9 months ago