☆77Feb 15, 2025Updated last year
Alternatives and similar repositories for pena
Users that are interested in pena are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The repository of VulnBot: Autonomous Penetration Testing for A Multi-Agent Collaborative Framework.☆157Apr 7, 2025Updated last year
- Offline AI Security Assistant for Air-Gapped Pentesting☆78Apr 7, 2026Updated last week
- ☆11Aug 25, 2018Updated 7 years ago
- I was searching for such resource to work as cheat sheet series and guide me through different attack scenarios for API attacks, didn’t f…☆15May 5, 2025Updated 11 months ago
- Wireless Network Security Analysis Tool☆16Apr 27, 2025Updated 11 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- LLM Agent and Evaluation Framework for Autonomous Penetration Testing☆303Jun 24, 2025Updated 9 months ago
- Prototype of Full Agentic Application Security Testing, FAAST = SAST + DAST + LLM agents☆67May 1, 2025Updated 11 months ago
- Fuzzer for Amplification Vulnerabilities (USENIX '22, Krupp et al)☆16Aug 27, 2022Updated 3 years ago
- Implementation of QFuzz.☆17Dec 3, 2021Updated 4 years ago
- ad-exchange powershell scripts☆29Sep 23, 2025Updated 6 months ago
- Testing POC for use cases☆26Nov 24, 2024Updated last year
- An MCP Server for Pwndoc (Pentesting Reporting Tool)☆40Jan 23, 2026Updated 2 months ago
- ☆11Dec 9, 2025Updated 4 months ago
- Tool queries the OpenAI API to enhance the description, impact, and recommendation keys of a nuclei template.☆22Apr 1, 2023Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- THP Forensic Challenges☆23Jul 28, 2023Updated 2 years ago
- ☆18Sep 4, 2023Updated 2 years ago
- This repo contains the codes of the penetration test benchmark for Generative Agents presented in the paper "AutoPenBench: Benchmarking G…☆75Oct 28, 2025Updated 5 months ago
- A comprehensive local Linux Privilege-Escalation Benchmark☆46Nov 7, 2025Updated 5 months ago
- ☆16Apr 25, 2025Updated 11 months ago
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆34Jan 4, 2025Updated last year
- ☆13Mar 23, 2023Updated 3 years ago
- [ICLR 2025 SCI-FM Workshop] Lemur: Log Parsing with Entropy Sampling and Chain-of-Thought Merging☆14Mar 27, 2025Updated last year
- This repository contains random Nuclei templates I've created. Most of them based on recent security issues and exploits.☆18May 21, 2024Updated last year
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Autonomous penetration testing using a swarm of AI agents. Orchestrates recon, classification, exploitation, and reporting specialists wi…☆224Mar 28, 2026Updated 2 weeks ago
- ETW forensic tool for Volatility3 plugin☆17Nov 15, 2024Updated last year
- Fixes corrupted Magic Bytes for PNG, JPG and JPEG☆11Aug 4, 2021Updated 4 years ago
- Companion repository of the "Dancer in the Dark" paper.☆19Jul 13, 2024Updated last year
- AI featured threat modeling and security review project☆17Nov 17, 2024Updated last year
- Block Windows Defender by deny ACL☆89Jan 12, 2026Updated 3 months ago
- ☆21Mar 17, 2023Updated 3 years ago
- A GitHub workflow to identify employees that have leaked your organization's code☆13May 23, 2023Updated 2 years ago
- Stats about HTTP response security headers usage mentioned by the OSHP.☆17Jan 25, 2026Updated 2 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- This is the Network Flow Generator for ICSSIM☆17Aug 28, 2025Updated 7 months ago
- The best way to send emails in Go.☆12Feb 4, 2021Updated 5 years ago
- The all-in-one hacking toolbox for hardware penetration testing.☆18Jun 4, 2024Updated last year
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆29Nov 20, 2024Updated last year
- Burp Suite extension to easily export sub domains☆12Dec 2, 2019Updated 6 years ago
- This is the LLM integration app that contains the vulnerability; please use it to verify the vulnerability of the LLM integration app.☆74Apr 3, 2026Updated 2 weeks ago
- A not so awesome list of adversary emulation gems for aspiring red/blue/purple teamers☆16Jul 19, 2022Updated 3 years ago