mazen160 / shenninaLinks
Automating Host Exploitation with AI
☆547Updated 3 years ago
Alternatives and similar repositories for shennina
Users that are interested in shennina are comparing it to the libraries listed below
Sorting:
- Multiplatform Python WebShell☆319Updated last month
- RedGuard is a C2 front flow control tool,Can avoid Blue Teams,AVs,EDRs check.☆1,555Updated last year
- TOP All bugbounty pentesting CVE-2023- POC Exp RCE example payload Things☆720Updated this week
- Black Hat Asia 2023 PDF Public☆581Updated 2 years ago
- A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions☆476Updated 4 months ago
- An XSS Exploitation Tool☆336Updated last month
- EPSS & VEDAS Score Aggregator for CVEs☆256Updated this week
- A python script to scan for Apache Tomcat server vulnerabilities.☆887Updated last week
- A proof of concept exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager☆357Updated 3 years ago
- https://cve.mitre.org/☆167Updated 2 weeks ago
- Pre-Built Vulnerable Multiple API Scenarios Environments Based on Docker-Compose.☆418Updated 3 years ago
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆529Updated last year
- Nuclei AI - Browser Extension for Rapid Nuclei Template Generation☆548Updated last year
- Totally Insecure Web Application Project (TIWAP)☆178Updated 2 years ago
- Uses ChatGPT API, Bard API, and Llama2, Python-Nmap, DNS Recon, PCAP and JWT recon modules and uses the GPT3 model to create vulnerabilit…☆590Updated last year
- Script for generating revshells☆478Updated last year
- Asset discovery and identification tools 快速识别 Web 指纹信息,定位资产类型。辅助红队快速定位目标资产信息,辅助蓝队发现疑似脆弱点☆2,135Updated last year
- Pentesting automation platform that combines hacking tools to complete assessments☆518Updated this week
- A fully automated, reliable, and accurate scanner for finding Spring4Shell and Spring Cloud RCE vulnerabilities☆657Updated 3 years ago
- A tool for creating hidden accounts using the registry || 一个使用注册表创建隐藏帐户的工具☆484Updated 3 years ago
- PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.☆445Updated 2 years ago
- A webshell that can bypass some system security, all code has been obfuscated to bypass malware scans freely.☆257Updated last year
- a lightweight, flexible and novel open source poc verification framework☆237Updated 3 years ago
- OWASP PTK - application security browser extension.☆168Updated this week
- AutoPentest-DRL: Automated Penetration Testing Using Deep Reinforcement Learning☆411Updated 3 years ago
- Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds☆140Updated this week
- Proof of Concept (PoC) CVE-2021-4034☆99Updated 3 years ago
- Tool to find CVEs and Exploits.☆489Updated last year
- Afuzz is an automated web path fuzzing tool for the Bug Bounty projects.☆312Updated 2 years ago
- GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsof…☆634Updated 9 months ago