Automated, aggressive reconnaissance engine for Bug Bounty Hunting and Red Teaming. Features hardware auto-scaling, smart recursion, and vulnerability scanning.
☆17Dec 18, 2025Updated 2 months ago
Alternatives and similar repositories for LeetSec-Tools
Users that are interested in LeetSec-Tools are comparing it to the libraries listed below
Sorting:
- ☆10Dec 31, 2025Updated 2 months ago
- A low cost Arduino based model rocket altimeter that logs data & displays them via a Processing Sketch☆14Jun 24, 2018Updated 7 years ago
- ☆13Jul 29, 2021Updated 4 years ago
- This is a POC for the CVE-2023-3883 exploit targeting WinRAR up to 6.22. Modified some existing internet-sourced POCs by introducing grea…☆13Aug 31, 2023Updated 2 years ago
- A scanner for the FortiNet vulnerability CVE-2025-64446☆29Nov 18, 2025Updated 3 months ago
- Agentic Pentesting MCP server that discovers, exploits, and reports web application vulnerabilities.☆34Feb 22, 2026Updated last week
- Simple Chatbot for testing AI Red Team tooling☆17Feb 11, 2025Updated last year
- Useful Pentest tool links☆12Aug 13, 2020Updated 5 years ago
- Ran is an experimental offensive tool for Kubernetes clusters with the goal to enable quick emulation of adversary techniques and a colle…☆30Updated this week
- Splunk Stuffs!☆13Oct 14, 2023Updated 2 years ago
- ✍️ A curated list of CVE PoCs.☆13Jan 24, 2018Updated 8 years ago
- ☆31Updated this week
- MCP Parasite☆46Feb 20, 2026Updated last week
- Ransoblin (Ransomware Bokoblin)☆18Oct 4, 2020Updated 5 years ago
- This project provides a set of Google Apps Scripts designed to help you identify and analyze potentially malicious domains directly from …☆14Sep 4, 2024Updated last year
- Mishky's AD Range & The Escalation Path from Hell, version 1.1☆17Feb 5, 2026Updated last month
- ☆19May 30, 2022Updated 3 years ago
- A Windows Store 8.1 or Windows 10 (UWP) application that uses Azure AD and the ADAL library to authenticate the user and call a web API u…☆15Jan 30, 2020Updated 6 years ago
- M5Stack Cardputer Virtual REPL☆20Sep 15, 2024Updated last year
- This repository contains various threat hunting tools written in Python and is documented in the series Python Threat Hunting Tools which…☆18Nov 16, 2023Updated 2 years ago
- brownie port of damn vulnerable defi☆14Feb 3, 2022Updated 4 years ago
- A command line Curses based json viewer and tabulator☆30Aug 3, 2025Updated 7 months ago
- ☆14May 20, 2018Updated 7 years ago
- A tribute app in java to the one and only Elder Plinius aka Pliny☆20Feb 15, 2025Updated last year
- High-level Threat Intelligence playbooks☆20Mar 6, 2021Updated 4 years ago
- Run TTPs, with AI!☆71Feb 23, 2026Updated last week
- Offline AI Security Assistant for Air-Gapped Pentesting☆65Feb 22, 2026Updated last week
- Docker container for running CobaltStrike 4.7 and above☆24Mar 20, 2025Updated 11 months ago
- Open-source LLM Prompt-Injection and Jailbreaking Playground☆30Jul 19, 2025Updated 7 months ago
- Apple BLE proximity pairing message spoofing☆19Aug 29, 2023Updated 2 years ago
- A new DOS Perl Programm☆19Nov 5, 2013Updated 12 years ago
- Programs generated by ChatGPT☆27Jul 19, 2023Updated 2 years ago
- An ultra lightweight web screenshot tool with advanced DOM analysis features.☆40Dec 2, 2025Updated 3 months ago
- All things specific to LLM Red Teaming Generative AI☆29Oct 22, 2024Updated last year
- A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.☆27Mar 20, 2025Updated 11 months ago
- ☆105Feb 7, 2026Updated 3 weeks ago
- ☆26Apr 1, 2023Updated 2 years ago
- Token Elevation to authorized user as SYSTEM or Domain Admins☆25Nov 22, 2025Updated 3 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year