This tool provides an interactive TUI for reviewing Nessus finding exports, running security tools (nmap, netexec, metasploit), and tracking progress.
☆68Apr 24, 2026Updated last week
Alternatives and similar repositories for cerno
Users that are interested in cerno are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Convert your HackerOne reports into reusable AI skills.☆92Mar 9, 2026Updated last month
- ☆58Mar 9, 2026Updated last month
- A tool to easily perform GitHub Device Code Phishing on red team engagements☆92Feb 9, 2026Updated 2 months ago
- A small security playground implementation of GHOSTS User Simulation framework with an Active Directory deployment and Elastic.☆20Jul 17, 2024Updated last year
- Internal Network Penetration Test Playbook☆17Apr 18, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A Crystal Palace shared library to resolve & perform syscalls☆61Oct 29, 2025Updated 6 months ago
- Network Fuzzing Framework☆64Jan 17, 2026Updated 3 months ago
- Linux CS bypass technique☆33Feb 4, 2025Updated last year
- ☆19Jul 14, 2025Updated 9 months ago
- Enhanced version of binaryninja-ollama and without using the ollama Python library☆13Jan 23, 2025Updated last year
- CSS injection requires an attacker to load a standalone CSS file to leak HTML tag attributes.☆21Apr 19, 2024Updated 2 years ago
- Simple bash script to spray known credentials against multiple services with netexec☆81Jan 16, 2026Updated 3 months ago
- A TUI for Active Directory collection.☆136Mar 17, 2026Updated last month
- SafeCrypt is an academic ransomware simulation suite developed for Red Team engagements. It demonstrates modern malware techniques includ…☆34Oct 3, 2025Updated 7 months ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆89Dec 7, 2025Updated 4 months ago
- Mail Header Detective is a powerful tool that can help dissect complex email headers, providing useful insights and valuable information …☆14May 5, 2024Updated last year
- Semantic analysis engine for detecting vulnerability fixes in Windows kernel driver patches — 58 YAML rules, Ghidra decompilation, reacha…☆62Feb 26, 2026Updated 2 months ago
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆17Sep 10, 2024Updated last year
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- ☆50Jan 8, 2026Updated 3 months ago
- genAI agent providing security context, tooling for performing security analysis on CVE, components and more☆23Updated this week
- Mitre ATT&CK framework tactics and techniques in markdown format for best use in Obsidian☆18Aug 7, 2024Updated last year
- ☆12Jun 20, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- Conditional Access Reporting☆29Apr 4, 2025Updated last year
- This is a PAM Skeleton Key that can be used for persistence, lateral movement, and privilege escalation.☆43Apr 23, 2026Updated last week
- Passive JavaScript reconnaissance for penetration testers — bridging Burp Suite traffic into structured, AST-based analysis in VSCode.☆36Feb 5, 2026Updated 2 months ago
- A network segmentation and egress control testing tool for PCI DSS v4.0 compliance. Automatically discovers network segments, validates i…☆13Aug 15, 2025Updated 8 months ago
- 🛡️ Free AI that blocks hackers while you sleep. Runs on cheap hardware. When someone in Tokyo gets attacked, you're protected in 30 seco…☆40Apr 19, 2026Updated 2 weeks ago
- A centralized list of the various Potato Windows exploits.☆22Mar 31, 2026Updated last month
- 钉钉数据库解密工具,支持 WEB UI 展示 | DingTalk Database Decryption Tool with Web UI Visualization.☆59Jan 20, 2026Updated 3 months ago
- Lateral Movement Bof with MSI ODBC Driver Install☆149Sep 30, 2025Updated 7 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Chrome Extensions Dataset☆11Updated this week
- A basic username enumeration and password spraying tool aimed at spraying Microsoft's DOM based authentication using selenium.☆36Nov 27, 2023Updated 2 years ago
- GitHub Action to alert on security patches before the CVE drops.☆199Apr 19, 2026Updated 2 weeks ago
- A library to access RTL-SDR devices and receive and demodulate radio signals from your web application.☆19Apr 15, 2026Updated 2 weeks ago
- A practical client for ADWS in Golang.☆51Mar 3, 2026Updated 2 months ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- Burp plugin for jxscout☆21May 12, 2025Updated 11 months ago