vazor-code / cyber-findLinks
CyberFind — a next-generation OSINT reconnaissance tool designed for cybersecurity professionals, penetration testers, and digital investigators. Search for users across 200+ platforms with speed and accuracy.
☆34Updated last week
Alternatives and similar repositories for cyber-find
Users that are interested in cyber-find are comparing it to the libraries listed below
Sorting:
- Ludus FastMCP enables AI-powered management of Ludus cyber ranges through natural language commands. The server exposes **157 tools** acr…☆58Updated last week
- AI-powered subdomain enumeration tool with local LLM analysis via Ollama - 100% private, zero API costs☆182Updated last month
- Guardian is a production-ready AI-powered penetration testing automation CLI tool that leverages Google Gemini and LangChain to orchestra…☆207Updated last week
- RProxy LAB is intended solely for educational purposes and authorized security testing with EvilGinx / Modlishka / EvilPuppet e.t.c tools☆45Updated 2 weeks ago
- ATHF is a framework for agentic threat hunting - building systems that can remember, learn, and act with increasing autonomy.☆134Updated 2 weeks ago
- EVA is an AI-assisted penetration testing agent that enhances offensive security workflows by providing structured attack guidance, conte…☆236Updated this week
- CF GeoBypasser Cyberpunk Framework is a Modular Offensive Toolkit designed to discover and bypass Cloudflare-based Geo-restrictions using…☆44Updated 3 weeks ago
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆165Updated 5 months ago
- NeuroSploitv2 is an advanced, AI-powered penetration testing framework designed to automate and augment various aspects of offensive secu…☆211Updated last week
- ☆55Updated last month
- An open-source self-hosted purple team management web application.☆25Updated 3 weeks ago
- IP Rotation from different providers - Like FireProx but for GCP, Azure, Alibaba and CloudFlare☆249Updated 2 weeks ago
- 🛡️ Detect and respond to security threats in real-time with God-Eye, an AI-driven tool designed for privacy and local deployment on mult…☆38Updated this week
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆28Updated last month
- Extract data from modern Chrome versions, including refresh tokens, cookies, saved credentials, autofill data, browsing history, and book…☆119Updated last week
- ☆52Updated 3 weeks ago
- Open-source offensive security platform for conducting phishing campaigns that weaponizes iCalendar automatic event processing.☆138Updated 2 weeks ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆43Updated 8 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆129Updated 9 months ago
- LLMON 🍋 - The World's First Web Adversarial AI Firewall☆24Updated last week
- Red Team tools containerized☆74Updated 3 weeks ago
- Automated red-team toolkit for stress-testing LLM defences - Vector Attacks on LLMs (Gendalf Case Study)☆107Updated 5 months ago
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆213Updated last week
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆155Updated 2 months ago
- This repository consists of extensions, that hacktron uses to execute specific workflows in CLI.☆59Updated this week
- AI / LLM Red Team Field Manual & Consultant’s Handbook☆216Updated last week
- Chameleon is a polymorphic engine for x86_64 position independent shellcode that has been created out of the need to evade signature-base…☆47Updated 2 months ago
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆80Updated 3 months ago
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆47Updated 4 months ago
- Execute shellcode via ASPNET compiler☆59Updated 2 months ago