AIRecon is an autonomous cybersecurity agent that combines a self-hosted Large Language Model (Ollama) with a Kali Linux Docker sandbox and a Textual TUI. It is designed to automate security assessments, penetration testing, and bug bounty reconnaissance — without any API keys or cloud dependency.
☆69Mar 15, 2026Updated this week
Alternatives and similar repositories for airecon
Users that are interested in airecon are comparing it to the libraries listed below
Sorting:
- Subdosec is a fast, accurate subdomain takeover scanner with no false positives. It also offers a database of sites vulnerable to subdoma…☆60Feb 24, 2026Updated 3 weeks ago
- Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist.☆11Sep 22, 2023Updated 2 years ago
- Simple web app to track OWASP WSTG security testing progress☆27Sep 12, 2025Updated 6 months ago
- OSCP Study Guide 2023 - All tools and notes you will need!☆16Jan 11, 2023Updated 3 years ago
- Command line tool to fetch, decode and brute-force CodeIgniter session cookies by guessing and bruteforcing secret keys.☆16Jan 31, 2025Updated last year
- Slides and resources from MCTTP 2025 Talk☆67Oct 26, 2025Updated 4 months ago
- 🛡️ The Ultimate Cybersecurity Library | 160+ curated books, guides & resources covering Ethical Hacking, Penetration Testing, Bug Bounty…☆46Mar 5, 2026Updated 2 weeks ago
- Subdomain Scanner - the most exhaustive tool for sub-domain recognition and mapping to related IPs and ASNs☆18Jul 4, 2025Updated 8 months ago
- Libro: Full Red Team: Ethical Hacking: Una guía práctica y profunda sobre hacking ético: técnicas, scripts y estrategias reales para pent…☆30Dec 5, 2025Updated 3 months ago
- collection of blogs about malware development and analysis☆70Dec 2, 2025Updated 3 months ago
- WAF bypass PoC☆50Oct 9, 2023Updated 2 years ago
- Reflected XSS Payload List for Vue.js (2 & 3)☆15Jan 12, 2023Updated 3 years ago
- Notes taken from Android App Hacking - Black Belt Edition (UDEMY - Roman Stuehler)☆24May 19, 2024Updated last year
- A mirror of several precompiled standalone red-teaming tools.☆19Feb 2, 2023Updated 3 years ago
- Start your journey with Bug Bounty.☆15Oct 12, 2022Updated 3 years ago
- A command-line utility for auditing DNS configuration using Zonemaster API☆32Aug 21, 2023Updated 2 years ago
- GarudRecon automates domain recon with top open-source tools to discover assets, enumerate subdomains, and detect XSS, SQLi, LFI, RCE & m…☆198Jan 24, 2026Updated last month
- My Custom made Nuceli-Templates☆22Aug 5, 2025Updated 7 months ago
- Webarchive is a Go package for pentesters and developers to interacting with the Wayback Machine's CDX API and integrate web archive util…☆11Feb 25, 2024Updated 2 years ago
- Remote BOF Runner is a Havoc extension framework for remote execution of Beacon Object Files (BOFs) using a PIC loader made with Crystal …☆91Jan 2, 2026Updated 2 months ago
- This repository contains a basic custom lab environment designed to demonstrate and explore SQL injection vulnerabilities. The lab provid…☆10Sep 20, 2023Updated 2 years ago
- Educational proof-of-concept demonstrating DEP/NX bypass using hardware breakpoints, vectored exception handling, and instruction emulati…☆99Oct 17, 2025Updated 5 months ago
- 🤹 Caido AI Skills☆54Updated this week
- CVE-2022-0847: Linux Kernel Privilege Escalation Vulnerability☆21Mar 8, 2022Updated 4 years ago
- GraphSpecter is a tool to audit GraphQL API☆21Oct 6, 2025Updated 5 months ago
- Nmap GUI with SearchSploit and vulnerability script integrations, schedules, and reports☆12Dec 22, 2025Updated 2 months ago
- LazyRev for Lazy People☆21Jul 5, 2023Updated 2 years ago
- ☆14Oct 14, 2022Updated 3 years ago
- A BOF that's a BOF Loader and more☆200Jan 17, 2026Updated 2 months ago
- e2e Scanning research module☆22Mar 8, 2026Updated last week
- ☆15Apr 17, 2025Updated 11 months ago
- Xilly Game Mode is a competitive-grade optimization utility designed to instantly reallocate your PC's resources for maximum gaming perfo…☆20Feb 13, 2026Updated last month
- GUI wireless 802.11 penetration tool☆12Oct 7, 2016Updated 9 years ago
- Manajemen dan monitoring pengeluaran Anda, only single user tidak untuk dikomersialkan☆20Mar 13, 2026Updated last week
- Nodesub is a command-line tool for finding subdomains in bug bounty programs☆148Aug 1, 2024Updated last year
- Autonomous AI-powered security scanner — multi-agent vulnerability detection, exploitation, and validation engine☆61Updated this week
- ☆13Mar 20, 2023Updated 2 years ago
- Repo for hosting rayder workflows☆63Aug 31, 2023Updated 2 years ago
- Detect, analyze, test and Attack JSON Web Tokens in web traffic☆27Mar 13, 2026Updated last week