This tool provides an interactive TUI for reviewing Nessus finding exports, running security tools (nmap, netexec, metasploit), and tracking progress.
☆65Feb 5, 2026Updated last month
Alternatives and similar repositories for cerno
Users that are interested in cerno are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Notion C2 Profile for Mythic☆40Mar 3, 2026Updated 3 weeks ago
- SVG Analysis and generation tools for commonly seen SVG attachment phishing☆55Sep 24, 2025Updated 6 months ago
- Tool that gathers a customizable set of ETW telemetry and generates user-defined detections☆47Jan 28, 2026Updated last month
- Simple bash script to spray known credentials against multiple services with netexec☆72Jan 16, 2026Updated 2 months ago
- ☆19Jul 14, 2025Updated 8 months ago
- CSS injection requires an attacker to load a standalone CSS file to leak HTML tag attributes.☆21Apr 19, 2024Updated last year
- Semantic analysis engine for detecting vulnerability fixes in Windows kernel driver patches — 58 YAML rules, Ghidra decompilation, reacha…☆58Feb 26, 2026Updated 3 weeks ago
- A CLI tool for managing DigitalOcean droplets with automated setup, SSH configuration, and lifecycle management.☆88Updated this week
- This is a proof-of-work for abusing "fsmonitor" against IDE.☆43Nov 22, 2025Updated 4 months ago
- Offensive security toolkit for Claude Code☆70Mar 15, 2026Updated last week
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆89Dec 7, 2025Updated 3 months ago
- Deny list generator for password filters☆26Jul 29, 2024Updated last year
- CVE-2020-14882 Weblogic-Exp☆17Oct 29, 2020Updated 5 years ago
- ☆16Aug 10, 2025Updated 7 months ago
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- Agent Identity Protocol - Zero-trust security layer for AI agents. Policy enforcement proxy for MCP with Human-in-the-Loop approval, DLP …☆21Mar 5, 2026Updated 2 weeks ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- Passive JavaScript reconnaissance for penetration testers — bridging Burp Suite traffic into structured, AST-based analysis in VSCode.☆36Feb 5, 2026Updated last month
- Mitre ATT&CK framework tactics and techniques in markdown format for best use in Obsidian☆18Aug 7, 2024Updated last year
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- Conditional Access Reporting☆29Apr 4, 2025Updated 11 months ago
- The code implements ransomware-like behavior, encrypting files by changing their extensions to "k3vil." It includes a decryption process …☆19May 23, 2024Updated last year
- Tracking OpenClaw CVEs☆104Updated this week
- A centralized list of the various Potato Windows exploits.☆22Dec 30, 2024Updated last year
- GitHub Action to alert on security patches before the CVE drops.☆185Mar 14, 2026Updated last week
- Version 2 of the Rhythm Randomizer project☆13Jan 6, 2023Updated 3 years ago
- Lateral Movement Bof with MSI ODBC Driver Install☆148Sep 30, 2025Updated 5 months ago
- A simple Python script to do quick, targeted recon of a given domain.☆70Apr 17, 2025Updated 11 months ago
- CurlWright is a Cloudflare bypass tool that leverages Playwright to execute curl commands with full browser capabilities, allowing you to…☆33Mar 9, 2026Updated 2 weeks ago
- MCP server for Google Drive, Docs, Sheets, Slides, Calendar, Gmail, and Contacts☆39Mar 11, 2026Updated last week
- Convert your HackerOne reports into reusable AI skills.☆73Mar 9, 2026Updated 2 weeks ago
- A tool to easily perform GitHub Device Code Phishing on red team engagements☆88Feb 9, 2026Updated last month
- Burpsuite Extension for Jsmon☆23Feb 5, 2026Updated last month
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- A course about terraform☆11Apr 13, 2021Updated 4 years ago
- ☆11Oct 9, 2022Updated 3 years ago
- A Frida powered testing library designed to assist with security assesments of iOS applications written in Swift 5.☆17Apr 9, 2021Updated 4 years ago
- ☆32Oct 21, 2023Updated 2 years ago
- A wrapper around tools used for subdomain enumeration, to automate the workflow, on a given domain, written in bash.☆79Aug 2, 2022Updated 3 years ago