AI-powered pentesting framework with automated recon and exploitation. Multi-source subdomain discovery, active vuln testing (XSS/SQLi/SSRF/IDOR), AI-driven payload generation, local inference, structured reporting. For pentesters and bug bounty hunters.
☆56Dec 27, 2025Updated 2 months ago
Alternatives and similar repositories for Pinakastra
Users that are interested in Pinakastra are comparing it to the libraries listed below
Sorting:
- GraphSpecter is a tool to audit GraphQL API☆21Oct 6, 2025Updated 5 months ago
- Purpose-built Red Team network hardware implant made from common components.☆27Mar 18, 2023Updated 2 years ago
- This is the open source version of vulnerable.codes platform.☆29Apr 17, 2025Updated 10 months ago
- Cybersecurity Psychology Framework☆19Feb 22, 2026Updated 2 weeks ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- Hide your Ass by changing Public IP and userAgents in every 10 seconds - CYBERSECURITY☆10Feb 19, 2023Updated 3 years ago
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆13Nov 1, 2023Updated 2 years ago
- The authentication bypass vulnerability in GitHub Enterprise Server (GHES) allows an unauthorized attacker to access an instance of GHES …☆50May 21, 2024Updated last year
- This guide provides comprehensive techniques for penetration testing Active Directory environments. It covers everything from initial rec…☆21Jul 3, 2025Updated 8 months ago
- ☆20Jan 12, 2022Updated 4 years ago
- 🛝 Transforms any RCE into a functional dumb shell. Designed for constrained environments (e.g., firewalls) where traditional reverse she…☆14Feb 18, 2026Updated 2 weeks ago
- ☆18Mar 13, 2025Updated 11 months ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- ☆13Mar 1, 2024Updated 2 years ago
- ☆10Sep 20, 2020Updated 5 years ago
- ☆11Apr 1, 2025Updated 11 months ago
- This repository contains a basic custom lab environment designed to demonstrate and explore SQL injection vulnerabilities. The lab provid…☆10Sep 20, 2023Updated 2 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆17Jun 22, 2024Updated last year
- The Public Physical Pentesting Paraphernalia Project (P5) is a collection of 3D printing models, DIY tool instructions and entry-level me…☆12Sep 6, 2019Updated 6 years ago
- Sample Random GitHub Repositories☆11Dec 27, 2025Updated 2 months ago
- ☆14Dec 27, 2020Updated 5 years ago
- ☆10Apr 28, 2020Updated 5 years ago
- Modified SuperTuxKart to support sending CANBus messages☆12Dec 9, 2014Updated 11 years ago
- ☆19Jan 13, 2025Updated last year
- ☆13Jun 15, 2024Updated last year
- Security Blogs - A simple aggregator for security news/blog☆24Jan 19, 2026Updated last month
- HTTP based framework for building command and control components for remote access trojans☆15Aug 2, 2021Updated 4 years ago
- Detection: Identify the presence of the Ploutus malware by checking for known indicators of compromise (IoCs) such as specific files, reg…☆11Sep 5, 2024Updated last year
- ☆15Mar 17, 2025Updated 11 months ago
- Yet Another Mac Changer!!!☆12Jan 26, 2023Updated 3 years ago
- AI Powered Sensitive Information Detection☆20Mar 13, 2024Updated last year
- iban üzerinden bilgi toplamak için işlemi basitleştiren basit python kodu☆12Apr 6, 2023Updated 2 years ago
- Audit and test security vulnerabilities or simply wreak chaos upon your ROS system☆11Jul 12, 2018Updated 7 years ago
- ☆14Sep 11, 2023Updated 2 years ago
- Windows usermode rootkit with inline hooking for process/file/registry hiding, indirect syscalls, keylogger, HTTPS C2, dropper, and EDR/A…☆28Jan 22, 2026Updated last month
- ☆13Mar 20, 2023Updated 2 years ago
- ☆11Apr 8, 2024Updated last year
- This vulnerability could allow an attacker to take complete control of a vulnerable Confluence server. This could allow the attacker to s…☆11May 24, 2024Updated last year
- Automated compromise detection of the world's most popular packages☆17Sep 25, 2023Updated 2 years ago