xoxruns / deadend-cliLinks
Agentic pentest tooling
☆126Updated this week
Alternatives and similar repositories for deadend-cli
Users that are interested in deadend-cli are comparing it to the libraries listed below
Sorting:
- ☆195Updated 9 months ago
- An archive of 0day.today exploits☆341Updated 6 months ago
- ☆20Updated last month
- AI / LLM Red Team Field Manual & Consultant’s Handbook☆229Updated this week
- Everything and anything related to password spraying☆151Updated last year
- Verizon Burp Extensions: AI Suite☆142Updated 9 months ago
- Abuse trust-boundaries to bypass firewalls and network controls☆384Updated 6 months ago
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆114Updated 5 months ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆87Updated last month
- BloodHound-MCP-AI is integration that connects BloodHound with AI through Model Context Protocol, allowing security professionals to anal…☆333Updated 7 months ago
- ☆176Updated 9 months ago
- Scripts to download every Wordpress plugin (updated in the last 2 years) and run Semgrep over the lot of it while storing output in a dat…☆89Updated 11 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆226Updated 10 months ago
- Payloads for AI Red Teaming and beyond☆314Updated 5 months ago
- BaldHead is a modular and interactive Active Directory (AD) attack framework built for red teamers and security testers. It automates enu…☆110Updated 7 months ago
- ☆241Updated last month
- Open-source offensive security platform for conducting phishing campaigns that weaponizes iCalendar automatic event processing.☆215Updated last month
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆76Updated 9 months ago
- Advanced Domain Controller attack and credential analysis tool leveraging DonPAPI database☆258Updated 2 months ago
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.☆158Updated 2 months ago
- A visual methodology tracking platform tailored for offensive security assessments☆238Updated 4 months ago
- A community-driven collection of BloodHound queries☆159Updated last week
- ☆105Updated 4 months ago
- A Red Team Activity Hub☆235Updated this week
- Cloud subdomains identification tool☆62Updated 9 months ago
- FrogPost: postMessage Security Testing Tool☆107Updated last month
- Converting your Burp Suite projects into JSON APIs which can be viewed with Swagger editor or imported into Postman.☆75Updated last year
- A research project to add some brrrrrr to Burp☆197Updated 11 months ago
- A collection of tools that I use in CTF's or for assessments☆107Updated 11 months ago
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆221Updated 9 months ago