BlacksmithAI is an OPEN-SOURCE advanced penetration testing framework that leverages multiple AI agents to automate security assessments. The system orchestrates specialized agents through a complete penetration testing lifecycle, from reconnaissance to post-exploitation using professional security tools in a controlled environment.
☆112Mar 4, 2026Updated 2 weeks ago
Alternatives and similar repositories for blacksmith
Users that are interested in blacksmith are comparing it to the libraries listed below
Sorting:
- Google's list of Certificate Transparency logs as a rust crate for use with sct.rs☆14Feb 17, 2023Updated 3 years ago
- the source code that powered gitlive.net☆11Feb 12, 2016Updated 10 years ago
- Passivedns monitor implementation in Rust.☆12Apr 21, 2016Updated 9 years ago
- a dockerized version of Træfik to be used on OpenShift☆13Sep 18, 2017Updated 8 years ago
- A complete simulator for quantum computing☆19Jan 3, 2026Updated 2 months ago
- A Productivity-Boosting Burp Suite extension written in Kotlin that enables persistent sticky session handling in web application testing…☆12Oct 8, 2025Updated 5 months ago
- Vibe Editing – Asynchronous Voice-to-Edit Flow with AI Agents in Cursor (AI Tinkerers Toronto - May 2025 Meetup: AGENTS at Ada)☆12May 22, 2025Updated 9 months ago
- Network scan tool for host and service discovery. Written in Rust.☆22Feb 17, 2026Updated last month
- OsintifyX: Powerful Open-source OSINT tool for extracting valuable information from Instagram profiles. OSINT: Instagram Forensics Tool☆11Feb 19, 2024Updated 2 years ago
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- Stealth Chromium browser for large-scale web scraping.☆83Mar 13, 2026Updated last week
- DomainsProject.org HTTP worker☆25Dec 11, 2022Updated 3 years ago
- A Model Context Protocol (MCP) server for providing code context from git repositories☆24Nov 13, 2025Updated 4 months ago
- envil forges Nix flakes and manages stacked environments☆19Dec 11, 2025Updated 3 months ago
- Scandiff is a PowerShell script to automate host discovery and scanning with nmap. After discovering and scanning hosts, scandiff perfor…☆18Oct 29, 2014Updated 11 years ago
- ☆23Apr 12, 2025Updated 11 months ago
- OAuth2-Module for PAM☆18Jun 18, 2017Updated 8 years ago
- Discover Non-Discoverable Bluetooth Classic devices☆13Oct 10, 2024Updated last year
- ☆20Sep 17, 2024Updated last year
- A collection of awesome penetration testing resources, tools and other shiny things☆17Jan 25, 2026Updated last month
- ☆10Sep 10, 2021Updated 4 years ago
- Vulnerable application for security issues demo☆17Jan 18, 2019Updated 7 years ago
- Automatic Microsoft Sentinel Deployment☆16Apr 1, 2025Updated 11 months ago
- Web knowledge is fragmented — duplicated across fonts, embeddings, metadata, and renderings. Humans see pixels, AI sees tokens, neither s…☆34Updated this week
- Simple XSS vulnerability checker tool very useful with xsschecker.☆28Nov 21, 2025Updated 3 months ago
- Use NeoVide as a traditional terminal emulator!☆20Jan 22, 2025Updated last year
- Jonathan Blows Emacs theme (sort of)☆16Jan 26, 2025Updated last year
- pwsh native host experiment☆12Jun 7, 2021Updated 4 years ago
- ☆12Jul 8, 2020Updated 5 years ago
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Apr 1, 2023Updated 2 years ago
- Medical records you can copy and paste☆12Mar 3, 2023Updated 3 years ago
- Showcase the use of personal access tokens in a B2B environment. Uses NextJS Framework.☆28Feb 5, 2026Updated last month
- simple react native todo list app powered by dfinity☆11Aug 3, 2021Updated 4 years ago
- Ceph Calamari Packages☆16Jul 13, 2015Updated 10 years ago
- 💃Utilities for automated functional testing in A-Frame scenes and components☆13May 13, 2018Updated 7 years ago
- gRPC client for the Merlin Server☆27Apr 17, 2025Updated 11 months ago
- An ICP/Cycles Market☆10Jan 27, 2022Updated 4 years ago
- A purple team oriented cyber range deployed in AWS with Terraform☆12Jun 8, 2020Updated 5 years ago
- A sophisticated GUI tool for creating malicious RAR archives that exploit the WinRAR path traversal vulnerability (CVE-2025-8088) using A…☆26Sep 4, 2025Updated 6 months ago