usr2r00t / OASC
OpenAI Security Console - Python3 AI-powered Cybersecurity Framework
☆16Updated 2 years ago
Alternatives and similar repositories for OASC:
Users that are interested in OASC are comparing it to the libraries listed below
- WebHook for Red Team☆26Updated 4 years ago
- Simple Tool for webhacking☆11Updated last year
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆40Updated 4 months ago
- Ded Security Framework is a tool aimed at security professionals☆34Updated 10 months ago
- A automated Meterpreter payload generator script in Bash That can start Listener automatically for specified payload. (only for KALI Linu…☆16Updated 3 years ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆14Updated 2 years ago
- Automated Pentest Recon Scanner☆14Updated 7 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆16Updated 2 years ago
- Hax is a mini-tool with really useful hacking tools.☆18Updated last year
- An Effiecent Tool To Change Tor IP's in Seconds,change mac address and clean all logs☆37Updated 3 years ago
- A Simple Script For SSH BruteForce☆36Updated last year
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.☆16Updated 4 years ago
- Hackfruit is an easy search tool that finds hacking tools, commands and cheat sheets. It helps cybersecurity learing and trainings, CTFs,…☆21Updated 2 years ago
- Gain A Meterpreter Shell With A BadUSB Attack In Less Than 5 Seconds.☆16Updated 3 years ago
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.☆64Updated 2 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆38Updated 2 years ago
- Who We Are☆19Updated 6 months ago
- Find open databases - Powered by Binaryedge.io☆15Updated 5 years ago
- If you found this, you are among the truly lucky, to be given providence to my curated and often custom wordlists. Enjoy, buddy, you've…☆40Updated 11 months ago
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- 🔥Ready, Aim, Fire.🔥☆16Updated 2 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆38Updated 6 months ago
- Rubber Ducky powered by NeoKey☆22Updated 10 months ago
- SMTP Open Relay Exploitation☆13Updated 4 years ago
- Enumeration & fingerprint tool☆24Updated last year
- Wifi network scanning tool for capturing WPA/WPA2 Handshakes☆27Updated 4 years ago
- Fast subdomains enumeration tool for penetration testers☆15Updated 5 years ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆16Updated 8 months ago
- A swiss army knife for pentesting networks☆20Updated 2 years ago