A structured red-team prompt for generating ethical hacking tools using AI - designed for use in labs, CTFs, and authorized security assessments
โ25Jun 26, 2025Updated 9 months ago
Alternatives and similar repositories for chatgpt-red-team
Users that are interested in chatgpt-red-team are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ๐ NASA โ Hacking ๐ Space ๐ข Themed Projects ๐ ethical hacking ๐ธ and cybersecurity ๐ก through ๐ NASA ๐ themed ๐ scenarios ๐ CTF loโฆโ34Jun 13, 2025Updated 10 months ago
- A structured portfolio of weekly CEH v13 assessments, vulnerability labs, and ethical hacking documentation to demonstrate practical cybeโฆโ23Jun 25, 2025Updated 9 months ago
- BlitzSSH is a multi-threaded SSH brute-force tool with Telegram integration for real-time notifications.โ15Nov 20, 2025Updated 4 months ago
- A Simple JS code to keylogger data and send it to the personal serverโ31Dec 30, 2024Updated last year
- โ19Apr 28, 2025Updated 11 months ago
- Virtual machines for every use case on DigitalOcean โข AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.โ75Apr 6, 2025Updated last year
- Mythic C2 CheatSheet for OSEPโ65Apr 1, 2026Updated 2 weeks ago
- The Shodan MCP Server by ADEO Cybersecurity Services provides cybersecurity professionals with streamlined access to Shodan's powerful reโฆโ20Mar 22, 2025Updated last year
- Robson is a simple LKM rootkit that uses the Linux kernel's kprobes tracing feature as a hooking mechanism.โ13Feb 16, 2023Updated 3 years ago
- BloodHound-MCP-AI is integration that connects BloodHound with AI through Model Context Protocol, allowing security professionals to analโฆโ349Jun 2, 2025Updated 10 months ago
- Rubidea - Bind XSS Server to Steal cookies.โ14May 2, 2020Updated 5 years ago
- The samples referenced in my book, Evasive Malware (No starch Press)โ60Feb 20, 2026Updated last month
- BOF to impersonate TrustedInstaller via DISM API trigger and thread impersonationโ122Mar 27, 2026Updated 3 weeks ago
- Cobalt Strike Aggressor Script for identifying security products on Windows hosts โ six enumeration methods rated by noise level, from siโฆโ44Feb 6, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways โข AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Automated pentest report writing and generation using DOCX templates and markdown.โ26Apr 1, 2025Updated last year
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create advโฆโ226Mar 28, 2025Updated last year
- Database interaction layer to store the Open Asset Model in a database management systemโ24Apr 1, 2026Updated 2 weeks ago
- Unix Process hollowing in rustโ22Dec 16, 2024Updated last year
- Automatically perform advanced NTLM hash relay attacksโ15Nov 4, 2022Updated 3 years ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.โ33Oct 2, 2023Updated 2 years ago
- Just a simple SMTP server, implementation of @corpix smtpd libraryโ15May 8, 2020Updated 5 years ago
- Step into my GitHub treasure troveโan immersive collection of comprehensive notes chronicling my Certified Ethical Hacker (CEH) lab escapโฆโ36Aug 13, 2023Updated 2 years ago
- Two applications for the M5Stack ATOM Echo running MicroPython.โ14Jun 2, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways โข AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- โ20Jan 19, 2023Updated 3 years ago
- CyberChef API MCP Server โจ๐งโ๐ณโ39Apr 3, 2026Updated 2 weeks ago
- Massive Vulnerability scannerโ12Mar 20, 2022Updated 4 years ago
- Parse scan results into python objects, i.e. Nessus, Nmap, testssl, metasploit, ...โ24Jan 4, 2020Updated 6 years ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debuggingโ208Mar 6, 2025Updated last year
- โ33Feb 27, 2024Updated 2 years ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whiโฆโ42Aug 22, 2024Updated last year
- โ112Apr 12, 2026Updated last week
- Direct syscalls Injection to bypass AV/EDRโ11May 18, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial โข AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A compendium of threat modeling and security testing resources for LLMs and GenAI agentsโ18Oct 16, 2024Updated last year
- cobalt strike stuff I have gathered from around githubโ31May 5, 2017Updated 8 years ago
- HEVD Exploits for fun and learning.โ15Aug 30, 2025Updated 7 months ago
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share thโฆโ12Feb 16, 2021Updated 5 years ago
- Cobalt Strike BOFSโ16Dec 20, 2023Updated 2 years ago
- Collection of rules and debug data for hashcatโ25Dec 2, 2025Updated 4 months ago
- BloodyAv is Custom Shell Code loader to Bypass Av and Edr.โ14Mar 21, 2022Updated 4 years ago