AI-powered pentesting framework with automated recon and exploitation. Multi-source subdomain discovery, active vuln testing (XSS/SQLi/SSRF/IDOR), AI-driven payload generation, local inference, structured reporting. For pentesters and bug bounty hunters.
☆57Dec 27, 2025Updated 3 months ago
Alternatives and similar repositories for Pinakastra
Users that are interested in Pinakastra are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Webarchive is a Go package for pentesters and developers to interacting with the Wayback Machine's CDX API and integrate web archive util…☆11Feb 25, 2024Updated 2 years ago
- Fast path fuzzing for hidden web directories.☆18Aug 6, 2025Updated 8 months ago
- GraphSpecter is a tool to audit GraphQL API☆21Oct 6, 2025Updated 6 months ago
- This is the open source version of vulnerable.codes platform.☆30Apr 17, 2025Updated last year
- some sploits☆19Sep 20, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Purpose-built Red Team network hardware implant made from common components.☆28Mar 18, 2023Updated 3 years ago
- ☆19Jan 13, 2025Updated last year
- Caido plugin for jxscout☆15Nov 22, 2025Updated 4 months ago
- A simple CDR software for disarming malicious contents contained in documents.☆10Nov 7, 2022Updated 3 years ago
- Hacking with PasteJacking technique☆22Jul 2, 2024Updated last year
- Placement solution for colleges and universities☆21Feb 24, 2026Updated last month
- A tech enumeration toolkit focused on 404 Not found pages.☆27Oct 6, 2024Updated last year
- Anti-hallucination research mode for Claude Code. Toggle on/off to enforce citation requirements and source grounding.☆120Updated this week
- Tutorials and Things to Do while Hunting Vulnerability.☆13Aug 30, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- wordpress hash cracker .☆65Sep 7, 2021Updated 4 years ago
- Hide your Ass by changing Public IP and userAgents in every 10 seconds - CYBERSECURITY☆10Feb 19, 2023Updated 3 years ago
- rootX is a modern, feature-rich IRC client built with Python and Tkinter, offering a clean and intuitive graphical interface while mainta…☆13Dec 8, 2025Updated 4 months ago
- crawl a website for links and expose all the vulnerable parameters.☆14Oct 2, 2022Updated 3 years ago
- A collection of one off hacks and simple scripts☆26Mar 21, 2023Updated 3 years ago
- This vulnerability could allow an attacker to take complete control of a vulnerable Confluence server. This could allow the attacker to s…☆11May 24, 2024Updated last year
- ☆22Jan 11, 2025Updated last year
- 🛝 Transforms any RCE into a functional dumb shell. Designed for constrained environments (e.g., firewalls) where traditional reverse she…☆14Apr 10, 2026Updated last week
- ☆13Jun 15, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Automated GitHub secret scanning with smart alerting & monitoring.☆31Jan 15, 2026Updated 3 months ago
- The authentication bypass vulnerability in GitHub Enterprise Server (GHES) allows an unauthorized attacker to access an instance of GHES …☆50May 21, 2024Updated last year
- Excel parser for various pentesting tools.☆31Jun 13, 2023Updated 2 years ago
- Hi, these are some scripts that i use whenever a mobile pentest task comes up . Hope they would be helpful for someone☆13Dec 14, 2023Updated 2 years ago
- An advanced scanner for exposed secrets in web pages, APIs, and source code.☆13Apr 22, 2025Updated 11 months ago
- Plugin for YATAS that audits AWS accounts for misconfiguration and security issues☆15Updated this week
- This guide provides comprehensive techniques for penetration testing Active Directory environments. It covers everything from initial rec…☆21Jul 3, 2025Updated 9 months ago
- AI Substitutor is an extension for Burp Suite that uses AI functionality to substitute values of HTTP request parameters and headers.☆28Apr 30, 2025Updated 11 months ago
- This repository contains a basic custom lab environment designed to demonstrate and explore SQL injection vulnerabilities. The lab provid…☆10Sep 20, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- collection of various grep patterns collected from tomnomnom/gf and other places☆23Oct 13, 2020Updated 5 years ago
- Explore CVE 2023-30845 automatically across multiple subdomains☆16Sep 30, 2023Updated 2 years ago
- "Securing Wealth in Poetry" crypto puzzle (0.03 BTC)☆13Mar 30, 2024Updated 2 years ago
- Tool based on AWS-CLI commands for AWS account hardening, following guidelines of the CIS Amazon Web Services Foundations Benchmark (http…☆13Jan 18, 2017Updated 9 years ago
- iban üzerinden bilgi toplamak için işlemi basitleştiren basit python kodu☆12Apr 6, 2023Updated 3 years ago
- A Cuckoo filter implementation in Python☆14Aug 9, 2022Updated 3 years ago
- Dump files via Directory Traversal, LFI, Arbitrary File Read in a breeze with the help of ffuf☆19Dec 20, 2023Updated 2 years ago