Study into generating POC / Exploits for the metasploit framework using LLMs
☆13Aug 27, 2023Updated 2 years ago
Alternatives and similar repositories for metAIsploit-assistant
Users that are interested in metAIsploit-assistant are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Prompts Methods to find the vulnerabilities in Generative Models☆20Feb 23, 2023Updated 3 years ago
- NMAP with LLM summaries☆16Jan 15, 2024Updated 2 years ago
- Future Electronics Creative Eval Board featuring a Microsemi SmartFusion2 or IGLOO2 FPGA☆17Oct 7, 2019Updated 6 years ago
- Released alongside with a talk at REcon 2023, TheRestarter is an interactive command-line tool is designed to interact with the Windows …☆15Jun 8, 2023Updated 2 years ago
- [2023 TDSC] Pre-trained Model-based Automated Software Vulnerability Repair: How Far are We?☆25Jun 2, 2023Updated 2 years ago
- A certificate generator/manager for the WiFi Pineapple NANO and TETRA☆12Jul 18, 2020Updated 5 years ago
- CROSS PLATFORM MULTI NETCAT SERVER☆12Sep 17, 2025Updated 6 months ago
- Data and structures regarding the research done on WdFilter☆12Apr 15, 2020Updated 5 years ago
- ☆12Aug 10, 2019Updated 6 years ago
- Command line tool for macaddress.io API.☆12Dec 11, 2018Updated 7 years ago
- A small script to find the exact Geo-location of IP☆40Nov 21, 2022Updated 3 years ago
- ☆12May 18, 2015Updated 10 years ago
- An simplest PE parser, which list all import and export entries☆12Oct 11, 2018Updated 7 years ago
- nmap nse script for scan a whole country☆13Jun 28, 2022Updated 3 years ago
- Automatically exported from code.google.com/p/windbgshark☆11Jul 1, 2015Updated 10 years ago
- A curated list of awesome Machine Learning frameworks, libraries and software. With repository stars⭐ and forks🍴☆17Updated this week
- MCP as a Judge is a behavioral MCP that strengthens AI coding assistants by requiring explicit LLM evaluations☆16Dec 15, 2025Updated 3 months ago
- Xenotix xBOT is a Cross Platform PoC Bot that abuse certain Google Services to implement it's C&C☆27Jun 18, 2018Updated 7 years ago
- SideEffect Keylogger☆14Dec 30, 2016Updated 9 years ago
- Packet Injection With WFP☆16Feb 20, 2023Updated 3 years ago
- A collection of sample code used in some experiments with Sliver C2☆16Mar 28, 2023Updated 2 years ago
- Undetectable Windows Payload Generation☆10Dec 2, 2017Updated 8 years ago
- Passive Reconnaissance Techniques Approach helps for penetration testing and bug bounty hunting by gathering information about a target s…☆20Aug 19, 2025Updated 7 months ago
- ☆11Sep 23, 2017Updated 8 years ago
- ☆10Nov 11, 2020Updated 5 years ago
- ZeroRemote Trojan SRC Extract☆19Mar 1, 2017Updated 9 years ago
- AlphaTracker is a computer vision pipeline with the practical and real-time advantages , which requires minimal hardware requirements and…☆13Jan 10, 2023Updated 3 years ago
- A Machine Learning based tool for identifying P2P (Peer To Peer) Bot-Nets using network traffic analysis, as well as detect the hosts inv…☆12Jan 4, 2023Updated 3 years ago
- Various scripts for working with local LLMs☆16Oct 19, 2023Updated 2 years ago
- PII detection platform, leveraging human-in-the-loop AI☆54Nov 29, 2024Updated last year
- Optimized for use in Kali Linux, KSploit is a user friendly menu driven control panel in which to drive many metasploit tasks. KSploit s…☆17Jul 2, 2025Updated 8 months ago
- Cross Platform AES 256 GCM Encryption / Decryption - C++ Version☆13Apr 15, 2023Updated 2 years ago
- Material UI components for React, based on StyledComponents☆21Feb 22, 2017Updated 9 years ago
- Simple CLI-oriented utility to test proxies☆19Oct 24, 2020Updated 5 years ago
- This is just a dumping ground for metasploit modules that I've worked on or am working on. Some have been submitted to Rapid7 and some h…☆17Jan 25, 2016Updated 10 years ago
- A phishing tool to set a soft-AP on raspberryPi, filter the Http request and DNS query from the client and redirect the connection to a f…☆17Mar 4, 2018Updated 8 years ago
- Tidy autoregressive inference in JAX☆15Sep 1, 2025Updated 6 months ago
- Binary Ninja plugin to perform automated analysis of Windows drivers☆20Aug 8, 2019Updated 6 years ago
- Digital Forensics Windows Registry (dfWinReg)☆54Dec 22, 2025Updated 3 months ago