☆209Jan 9, 2025Updated last year
Alternatives and similar repositories for AeroSpace-Cybersecurity
Users that are interested in AeroSpace-Cybersecurity are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆17Oct 21, 2023Updated 2 years ago
- Repo for experimenting and testing MCP server builds for CTI-related research.☆27May 13, 2025Updated last year
- This is a repository to experiment with MCP for security☆47Jan 22, 2025Updated last year
- A simple to use single-include Windows API resolver☆22Jul 9, 2024Updated last year
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆11Jan 30, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- C2 Infrastructure Automation☆119Jun 21, 2025Updated 11 months ago
- PowerShell script to automate enabling RDP, local admin user creation, and configuring firewall rules for RDP access.☆51Jan 22, 2025Updated last year
- ☆31May 31, 2022Updated 3 years ago
- Simple Chatbot for testing AI Red Team tooling☆17Feb 11, 2025Updated last year
- A python script to check printer across the world that allow printing on port 9100 trough pjl☆16Dec 27, 2024Updated last year
- Common Exercise Format - CEXF☆11Aug 15, 2024Updated last year
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- ☆37May 9, 2026Updated last week
- P4wnP1 A.L.O.A. by MaMe82 is a framework which turns a Rapsberry Pi Zero W into a flexible, low-cost platform for pentesting, red teaming…☆34Jul 5, 2025Updated 10 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Offensive Kubernetes Threat Matrix -- kubenomicon.com☆53Apr 1, 2026Updated last month
- Reflective shellcode runners using obfuscated Win32 APIs in C# and C++ (GetProcAddress & GetModuleHandle). For penetration testing.☆16Jul 17, 2025Updated 10 months ago
- Files for Aerospace Cybersecurity: Satellite Hacking Workshop☆50Feb 28, 2024Updated 2 years ago
- Bypass user-land hooks by syscall tampering via the Trap Flag☆139Aug 25, 2025Updated 8 months ago
- AI agent set for cloud security purple teaming, runs inside Claude Code, Gemini CLI, and Codex.☆45May 6, 2026Updated 2 weeks ago
- ☆13Apr 17, 2022Updated 4 years ago
- BLE based C2 for Hak5's Bash Bunny☆19Oct 31, 2023Updated 2 years ago
- Deathstar is an Empire plugin that automates gaining Domain and/or Enterprise Admin rights in Active Directory environments using common …☆20Mar 24, 2025Updated last year
- Dependency Confusion Security Testing Tool☆50Jul 21, 2022Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆231Mar 28, 2025Updated last year
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆17Apr 6, 2023Updated 3 years ago
- the POC of package.json RCE☆27Jun 24, 2025Updated 10 months ago
- ☆29Jun 18, 2025Updated 11 months ago
- Version 2 of the Graphical Realism Framework for Industrial Control Simulation (GRFICS)☆617Oct 29, 2025Updated 6 months ago
- ☆54Oct 10, 2023Updated 2 years ago
- SOAPI - The OpenAPI Documentation Scanner☆40Feb 17, 2025Updated last year
- Detect userland hooks placed by AV/EDR☆28Sep 4, 2023Updated 2 years ago
- ☆705May 13, 2026Updated last week
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆36Nov 26, 2024Updated last year
- Custom mini tools during Red Teaming engagements☆24May 12, 2026Updated last week
- Lateral Movement☆126Nov 14, 2023Updated 2 years ago
- ☆12Jun 20, 2022Updated 3 years ago
- ☆31Aug 13, 2025Updated 9 months ago
- ☆13Dec 15, 2024Updated last year
- A PowerShell-based script to analyze network logs from CSV files and detect potential beaconing behavior. Supports VirusTotal integration…☆17May 11, 2025Updated last year