☆206Jan 9, 2025Updated last year
Alternatives and similar repositories for AeroSpace-Cybersecurity
Users that are interested in AeroSpace-Cybersecurity are comparing it to the libraries listed below
Sorting:
- ☆17Oct 21, 2023Updated 2 years ago
- Repo for experimenting and testing MCP server builds for CTI-related research.☆27May 13, 2025Updated 10 months ago
- This is a repository to experiment with MCP for security☆47Jan 22, 2025Updated last year
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆11Jan 30, 2024Updated 2 years ago
- AI agent set for cloud security purple teaming, runs inside Claude Code, Gemini CLI, and Codex.☆38Updated this week
- C2 Infrastructure Automation☆119Jun 21, 2025Updated 8 months ago
- PowerShell script to automate enabling RDP, local admin user creation, and configuring firewall rules for RDP access.☆48Jan 22, 2025Updated last year
- ☆31May 31, 2022Updated 3 years ago
- Simple Chatbot for testing AI Red Team tooling☆17Feb 11, 2025Updated last year
- A python script to check printer across the world that allow printing on port 9100 trough pjl☆14Dec 27, 2024Updated last year
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- ☆38Nov 9, 2025Updated 4 months ago
- P4wnP1 A.L.O.A. by MaMe82 is a framework which turns a Rapsberry Pi Zero W into a flexible, low-cost platform for pentesting, red teaming…☆33Jul 5, 2025Updated 8 months ago
- Offensive Kubernetes Threat Matrix -- kubenomicon.com☆54Aug 12, 2025Updated 7 months ago
- Reflective shellcode runners using obfuscated Win32 APIs in C# and C++ (GetProcAddress & GetModuleHandle). For penetration testing.☆15Jul 17, 2025Updated 8 months ago
- Files for Aerospace Cybersecurity: Satellite Hacking Workshop☆49Feb 28, 2024Updated 2 years ago
- Bypass user-land hooks by syscall tampering via the Trap Flag☆139Aug 25, 2025Updated 6 months ago
- ☆12Apr 17, 2022Updated 3 years ago
- BLE based C2 for Hak5's Bash Bunny☆19Oct 31, 2023Updated 2 years ago
- Deathstar is an Empire plugin that automates gaining Domain and/or Enterprise Admin rights in Active Directory environments using common …☆20Mar 24, 2025Updated 11 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆228Mar 28, 2025Updated 11 months ago
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆17Apr 6, 2023Updated 2 years ago
- the POC of package.json RCE☆26Jun 24, 2025Updated 8 months ago
- ☆29Jun 18, 2025Updated 9 months ago
- Version 2 of the Graphical Realism Framework for Industrial Control Simulation (GRFICS)☆596Oct 29, 2025Updated 4 months ago
- SOAPI - The OpenAPI Documentation Scanner☆39Feb 17, 2025Updated last year
- ☆53Oct 10, 2023Updated 2 years ago
- ☆687Feb 28, 2026Updated 2 weeks ago
- Detect userland hooks placed by AV/EDR☆28Sep 4, 2023Updated 2 years ago
- ☆36Nov 26, 2024Updated last year
- Custom mini tools during Red Teaming engagements☆23Mar 7, 2026Updated last week
- Malware As A Service☆138Feb 26, 2024Updated 2 years ago
- ☆11Nov 11, 2023Updated 2 years ago
- ☆12Jun 20, 2022Updated 3 years ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,325Nov 12, 2025Updated 4 months ago
- ☆31Aug 13, 2025Updated 7 months ago
- ☆13Dec 15, 2024Updated last year
- ☆62Feb 12, 2026Updated last month