mazen160 / shenninaLinks
Automating Host Exploitation with AI
☆541Updated 2 years ago
Alternatives and similar repositories for shennina
Users that are interested in shennina are comparing it to the libraries listed below
Sorting:
- Black Hat Asia 2023 PDF Public☆578Updated 2 years ago
- RedGuard is a C2 front flow control tool,Can avoid Blue Teams,AVs,EDRs check.☆1,520Updated last year
- Uses ChatGPT API, Bard API, and Llama2, Python-Nmap, DNS Recon, PCAP and JWT recon modules and uses the GPT3 model to create vulnerabilit…☆584Updated 10 months ago
- Multiplatform Python WebShell☆318Updated 11 months ago
- TOP All bugbounty pentesting CVE-2023- POC Exp RCE example payload Things☆704Updated this week
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆529Updated last year
- PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.☆435Updated last year
- An XSS Exploitation Tool☆318Updated 2 months ago
- AutoPentest-DRL: Automated Penetration Testing Using Deep Reinforcement Learning☆374Updated 3 years ago
- A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions☆481Updated 2 years ago
- https://cve.mitre.org/☆163Updated 3 weeks ago
- Nuclei AI - Browser Extension for Rapid Nuclei Template Generation☆532Updated 9 months ago
- MultiPlatform HTTP Reverse Shell☆240Updated 11 months ago
- A proof of concept exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager☆354Updated 2 years ago
- Asset discovery and identification tools 快速识别 Web 指纹信息,定位资产类型。辅助红队快速定位目标资产信息,辅助蓝队发现疑似脆弱点☆2,122Updated last year
- GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsof…☆625Updated 5 months ago
- Linux/Windows post-exploitation framework made by linux user☆1,623Updated 2 weeks ago
- Pre-Built Vulnerable Multiple API Scenarios Environments Based on Docker-Compose.☆412Updated 3 years ago
- The IoT security toolkit to help identify IoT related dashboards and scan them for default passwords and vulnerabilities.☆193Updated 9 months ago
- ☆597Updated 3 months ago
- Script for generating revshells☆476Updated last year
- a lightweight, flexible and novel open source poc verification framework☆237Updated 3 years ago
- 🦫 | GoRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific…☆590Updated 4 months ago
- A tool for creating hidden accounts using the registry || 一个使用注册表创建隐藏帐户的工具☆478Updated 3 years ago
- A webshell that can bypass some system security, all code has been obfuscated to bypass malware scans freely.☆247Updated 10 months ago
- The FOFA Library collects usage tips, common scenarios, F&Q, and more for FOFA.☆305Updated 2 months ago
- EPSS & VEDAS Score Aggregator for CVEs☆250Updated this week
- Pentesting automation platform that combines hacking tools to complete assessments☆510Updated this week
- A python script to scan for Apache Tomcat server vulnerabilities.☆850Updated last month
- ☆1,856Updated last week