mazen160 / shennina
Automating Host Exploitation with AI
☆523Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for shennina
- ☆216Updated 4 months ago
- Asset discovery and identification tools 快速识别 Web 指纹信息,定位资产类型。辅助红队快速定位目标资产信息,辅助蓝队发现疑似脆弱点☆2,021Updated 9 months ago
- RedGuard is a C2 front flow control tool,Can avoid Blue Teams,AVs,EDRs check.☆1,403Updated 2 months ago
- An XSS exploitation command-line interface and payload generator.☆1,261Updated 3 months ago
- A python script to scan for Apache Tomcat server vulnerabilities.☆791Updated 3 weeks ago
- Automatic SSTI detection tool with interactive interface☆815Updated 3 weeks ago
- Nuclei AI - Browser Extension for Rapid Nuclei Template Generation☆447Updated last year
- TOP All bugbounty pentesting CVE-2023- POC Exp RCE example payload Things☆662Updated this week
- NucleiFuzzer is a Powerful Automation tool for detecting XSS, SQLi, SSRF, Open-Redirect, etc.. Vulnerabilities in Web Applications☆1,303Updated last month
- ☆1,777Updated 11 months ago
- Uses ChatGPT API, Bard API, and Llama2, Python-Nmap, DNS Recon, PCAP and JWT recon modules and uses the GPT3 model to create vulnerabilit…☆483Updated this week
- A Burp Suite extension to add OpenAI (GPT) on Burp and help you with your Bug Bounty recon to discover endpoints, params, URLs, subdomain…☆827Updated last year
- Nuclei plugin for BurpSuite☆1,190Updated 2 months ago
- Tool to bypass 403/40X response codes.☆1,108Updated 3 months ago
- Sticky notes for pentesting, bug bounty, CTF.☆620Updated this week
- a lightweight, flexible and novel open source poc verification framework☆234Updated 2 years ago
- MultiPlatform HTTP Reverse Shell☆230Updated last month
- Check your WAF before an attacker does☆1,294Updated last week
- GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsof…☆536Updated last month
- The EXCLUSIVE Collection of 40,000+ Nuclei templates based on Wordfence intel. Daily updates for bulletproof WordPress security.☆921Updated this week
- 1337 Wordlists for Bug Bounty Hunting☆789Updated last week
- PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.☆385Updated last year
- Pre-Built Vulnerable Multiple API Scenarios Environments Based on Docker-Compose.☆389Updated 2 years ago
- fuzzuli is a url fuzzing tool that aims to find critical backup files by creating a dynamic wordlist based on the domain.☆732Updated last year
- 🦫 | GoRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific…☆424Updated 3 months ago
- Dome - Subdomain Enumeration Tool. Fast and reliable python script that makes active and/or passive scan to obtain subdomains and search …☆514Updated 9 months ago
- Tool to find CVEs and Exploits.☆453Updated 8 months ago
- Multiplatform Python WebShell☆295Updated last month
- Linux/Windows post-exploitation framework made by linux user☆1,323Updated 2 weeks ago