A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.
☆37Jul 27, 2023Updated 2 years ago
Alternatives and similar repositories for ExploitFlow
Users that are interested in ExploitFlow are comparing it to the libraries listed below
Sorting:
- A comprehensive local Linux Privilege-Escalation Benchmark☆46Nov 7, 2025Updated 4 months ago
- This repo contains the codes for the experiments of the paper "AutoPenBench: Benchmarking Generative Agents for Penetration Testing".☆13Oct 28, 2025Updated 4 months ago
- OASIS TC Open Repository: A GitHub public repository for development of a python library to transform between data-interchange formats (s…☆14Feb 10, 2022Updated 4 years ago
- ☆18Jun 25, 2024Updated last year
- 强制认证扫描与利用☆12Jul 21, 2023Updated 2 years ago
- Cobalt Strike BOFS☆16Dec 20, 2023Updated 2 years ago
- Benchmark of LLMs on real open-source projects against dependency hell, legacy toolchains, and complex build systems.☆53Dec 23, 2025Updated 3 months ago
- Correlate NVD datasets wIth CWE/CAPEC/CVSS labels for customised usage. Plus static analysis and data visualisation.☆13Nov 17, 2023Updated 2 years ago
- The goal of this repository is to work with Whiterabbitneo with PentestGPT☆55Jun 21, 2024Updated last year
- Helping Ethical Hackers use LLMs in 50 Lines of Code or less..☆977Sep 4, 2025Updated 6 months ago
- Cybersecurity Intelligent Pentesting Helper for Ethical Researcher (CIPHER). Fine tuned LLM for penetration testing guidance based on wri…☆37Dec 24, 2024Updated last year
- The original code for SCARA: Scalable Graph Neural Networks with Feature-Oriented Optimization (VLDB 2022) and Scalable Decoupling Graph …☆13Mar 8, 2024Updated 2 years ago
- Small Python-based web application honeypot with built-in analysis tools.☆12Sep 15, 2019Updated 6 years ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Jun 3, 2021Updated 4 years ago
- A Red Team Script to Detect Canary Tokens and Seed Files☆15Jan 2, 2024Updated 2 years ago
- CyberScan☆26Feb 21, 2018Updated 8 years ago
- Random Network Topology Generator☆24Jun 3, 2021Updated 4 years ago
- This Repository holds the pcap and Snort rules used for generating the dataset used in my paper: "Deterministic Dendritic Cell Algorithm …☆20Jun 30, 2019Updated 6 years ago
- CRUSOE: A Toolset for Cyber Situational Awareness and Decision Support in Incident Handling Inspired by the OODA Loop☆15Dec 11, 2024Updated last year
- Evolutionary Based Moving Target Cyber-Defense Master Thesis☆12Jan 21, 2020Updated 6 years ago
- Factored Interactive POMDP solver based on symbolic Perseus.☆11Aug 12, 2025Updated 7 months ago
- [IEEE T-IFS] AutoPT: How Far Are We from the Fully Automated Web Penetration Testing?☆32Aug 18, 2025Updated 7 months ago
- Build interactive map of cameras from Shodan☆23Jan 17, 2020Updated 6 years ago
- ☆12Jul 2, 2020Updated 5 years ago
- ☆16Feb 12, 2019Updated 7 years ago
- Vulnerabilities, security advisories, exploit codes and proof-of-concept codes.☆10Mar 1, 2026Updated 3 weeks ago
- ☆14Jul 14, 2018Updated 7 years ago
- An Attack Graphs Extension for Draw.io☆17Sep 4, 2025Updated 6 months ago
- ☆30Jun 4, 2024Updated last year
- Jess is short for Joern extended by Semantic Slicing. This tool allows you to import C code into a Code Property Graph, and then compute …☆17May 22, 2024Updated last year
- Template for asynchronously controlling meterpreter sessions☆13Jun 19, 2018Updated 7 years ago
- 802.11 radiotap and MPDU parser☆14Nov 23, 2017Updated 8 years ago
- Osquery Packs we use for customer security hardening☆12Jun 30, 2025Updated 8 months ago
- ☆15Nov 12, 2025Updated 4 months ago
- Impacket is a collection of Python classes for working with network protocols.☆12Nov 11, 2023Updated 2 years ago
- Active Response plugin. Osquery to execute wazuh/ossec active response plugins. You can write your own plugins, easy to plug☆11Jun 20, 2020Updated 5 years ago
- Modified ESP8266 Arduino core for Spacehuhn Projects☆14Aug 7, 2021Updated 4 years ago
- Deterministic and monitored traffic generation for inspecting and and training traffic models☆12Nov 19, 2024Updated last year
- Tools for attacking various MIFARE RFID cards☆16Jun 21, 2019Updated 6 years ago