mazen160 / shennina
Automating Host Exploitation with AI
☆533Updated 2 years ago
Alternatives and similar repositories for shennina:
Users that are interested in shennina are comparing it to the libraries listed below
- Linux/Windows post-exploitation framework made by linux user☆1,521Updated 3 weeks ago
- RedGuard is a C2 front flow control tool,Can avoid Blue Teams,AVs,EDRs check.☆1,457Updated 7 months ago
- A python script to scan for Apache Tomcat server vulnerabilities.☆821Updated last month
- Script for generating revshells☆466Updated 6 months ago
- Pre-Built Vulnerable Multiple API Scenarios Environments Based on Docker-Compose.☆393Updated 2 years ago
- Nuclei plugin for BurpSuite☆1,228Updated 6 months ago
- 1337 Wordlists for Bug Bounty Hunting☆818Updated 2 months ago
- Nuclei AI - Browser Extension for Rapid Nuclei Template Generation☆496Updated 3 months ago
- ☆1,916Updated last year
- The EXCLUSIVE Collection of 50,000+ Nuclei templates based on Wordfence intel. Daily updates for bulletproof WordPress security.☆998Updated this week
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆1,430Updated last year
- An XSS exploitation command-line interface and payload generator.☆1,352Updated 2 months ago
- Asset discovery and identification tools 快速识别 Web 指纹信息,定位资产类型。辅助红队快速定位目标资产信息,辅助蓝队发现疑似脆弱点☆2,077Updated last year
- a lightweight, flexible and novel open source poc verification framework☆234Updated 2 years ago
- A Burp Suite extension to add OpenAI (GPT) on Burp and help you with your Bug Bounty recon to discover endpoints, params, URLs, subdomain…☆848Updated last year
- Automatic SSTI detection tool with interactive interface☆1,030Updated 5 months ago
- Check your WAF before an attacker does☆1,354Updated 2 months ago
- Demonized Shell is an Advanced Tool for persistence in linux.☆368Updated 2 months ago
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆522Updated last year
- A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assignments.☆832Updated 4 years ago
- Afuzz is an automated web path fuzzing tool for the Bug Bounty projects.☆304Updated last year
- A tool for creating hidden accounts using the registry || 一个使用注册表创建隐藏帐户的工具☆468Updated 2 years ago
- Multiplatform Python WebShell☆308Updated 6 months ago
- TOP All bugbounty pentesting CVE-2023- POC Exp RCE example payload Things☆691Updated this week
- An XSS Exploitation Tool☆312Updated 2 months ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆1,934Updated last week
- Collection of PoC and offensive techniques used by the BlackArrow Red Team☆1,110Updated 8 months ago
- Cobalt Strike Malleable C2 Design and Reference Guide☆1,667Updated last year
- Java RMI Vulnerability Scanner☆854Updated 9 months ago
- Sticky notes for pentesting, bug bounty, CTF.☆676Updated this week