Use AI to install penetration testing tool suites in one click.
☆72Oct 5, 2025Updated 5 months ago
Alternatives and similar repositories for AI2PentestTool
Users that are interested in AI2PentestTool are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Learning materials, vulnerable demo app, and scripts related to the Client-Side Injections Part II YouTube Video☆30Oct 25, 2025Updated 5 months ago
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆16Jul 11, 2025Updated 8 months ago
- ☆32Jan 16, 2026Updated 2 months ago
- ☆13Nov 3, 2023Updated 2 years ago
- CVE-2025-55182-bypass-waf☆31Jan 8, 2026Updated 2 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Cryptanalysis of a proprietary 1999 video DRM system. Recovers 61 encrypted wrestling videos from the WCW Internet Powerdisk CD-ROM throu…☆25Jan 29, 2026Updated 2 months ago
- ☆18Jul 21, 2025Updated 8 months ago
- A powerful Go tool for finding origin IPs of domains by querying multiple security APIs and validating results with built-in HTTP client.☆43Dec 4, 2025Updated 3 months ago
- DPG Campus Tool. Shrink massive PDFs to fit AI upload limits. Sanitize before uploading to reduce risk of exposing sensitive data.☆46Jan 20, 2026Updated 2 months ago
- Use claude code anywhere.☆55Feb 12, 2026Updated last month
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆18Aug 20, 2023Updated 2 years ago
- Detection for CVE-2025-61675, CVE-2025-61678 & CVE-2025-66039☆47Dec 15, 2025Updated 3 months ago
- Pegasus Loki Rat is Whatsapp RAT, it integrates new modules, like recording , lockscreen , and locate options. Pegasus Loki RAT is a Pyth…☆34Jul 6, 2024Updated last year
- Koth - a repository with cheat-sheet Koth in THM (Try Hack Me)☆12Aug 7, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆14Oct 14, 2022Updated 3 years ago
- 🔍 Bug Bounty Search Engine - Advanced reconnaissance toolkit with 64+ Google dork queries organized into 10 categories for security rese…☆40Oct 6, 2025Updated 5 months ago
- This lab is for **EDUCATIONAL PURPOSES ONLY**. Use it responsibly and only on systems you own or have explicit permission to test. Do not…☆17Feb 20, 2026Updated last month
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆28Jul 21, 2025Updated 8 months ago
- A collection of in-depth studies authored by me on JavaScript engine vulnerabilities.☆49Feb 6, 2026Updated last month
- Wi-Fi Hacking Workshop☆14Dec 27, 2020Updated 5 years ago
- Google dorks for SQL injection, Local File Inclusion, open CCTV cams and sensitive information.☆14Jul 6, 2018Updated 7 years ago
- Python tool to generate crafted JWTs, exploiting the algorithm confusion vulnerability in JWT signature validation. Useful for security …☆25Mar 22, 2025Updated last year
- A Web Application Penetration Testing Framework build in React with an Node/Express/MongoDB back-end☆25Mar 7, 2023Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆18May 19, 2024Updated last year
- A tool for testing subdomain takeover possibilities at a mass scale.☆50May 23, 2021Updated 4 years ago
- ☆95Mar 18, 2026Updated last week
- List of Fresh DNS resolvers updates every 1 hour☆19Updated this week
- Pdf-exploit builder Non-Silent on C#☆20Aug 31, 2024Updated last year
- Collection of scripts and tools used during bug bounty work. This will be the location of my automation scripts created for my own person…☆143Dec 18, 2025Updated 3 months ago
- This repo collects nuclei template from 600+ github repos, updates every 6 hours.☆36Feb 17, 2026Updated last month
- Class☆10Nov 10, 2020Updated 5 years ago
- Simple XSS vulnerability checker tool very useful with xsschecker.☆28Nov 21, 2025Updated 4 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A multi-threaded port scanner implementation in Python☆12May 30, 2023Updated 2 years ago
- Smilex-Eye is a high-speed, advanced OSINT suite that bridges the gap between raw global internet data and actionable security intelligen…☆35Jan 4, 2026Updated 2 months ago
- Files for the Wi-Fi duck workshop☆12Jan 26, 2020Updated 6 years ago
- URILoot is a browser extension designed for Bug Bounty Hunters and Pentesters. Makes fetching uris easy from various sources.☆59Feb 15, 2026Updated last month
- Templtor is a bash script that will gather all the community Nuclei templates.☆31Dec 19, 2025Updated 3 months ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆15Jul 13, 2021Updated 4 years ago
- Port scanning is crucial in recon, but running it manually on big scopes? Nope. That’s why I made Nmap Bomber a Python script that runs f…☆40Jul 31, 2025Updated 7 months ago