Guardian is a production-ready AI-powered penetration testing automation CLI tool that leverages Google Gemini and LangChain to orchestrate intelligent, step-by-step penetration testing workflows while maintaining ethical hacking standards.
☆1,277Feb 27, 2026Updated this week
Alternatives and similar repositories for guardian-cli
Users that are interested in guardian-cli are comparing it to the libraries listed below
Sorting:
- Multi-target unauthenticated RCE scanner for CVE-2025-34085 affecting WordPress Simple File List plugin. Uploads, renames, and triggers P…☆33Jul 13, 2025Updated 7 months ago
- PentestAgent is an AI agent framework for black-box security testing, supporting bug bounty, red-team, and penetration testing workflows.☆1,694Feb 25, 2026Updated last week
- Security automation with n8n ideas: 100+ Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.☆94Sep 20, 2025Updated 5 months ago
- EmailCrawl - is a professional-grade OSINT (Open Source Intelligence) tool designed for advanced email address extraction through compreh…☆154Jan 26, 2026Updated last month
- world's first Opensource fully Autonomous AI Security Engineer☆236Nov 18, 2025Updated 3 months ago
- 𝐒𝐞𝐚𝐫𝐜𝐡 𝐏𝐡𝐨𝐧𝐞 is a tool for looking up linked phone number information, which uses the Phone Number Analyzer API from the RAPID…☆207Nov 12, 2024Updated last year
- AutoPentestX – Automated Pentesting & Vulnerability Reporting Tool☆1,003Feb 2, 2026Updated last month
- NeuroSploit is an advanced, AI-powered penetration testing framework designed to automate and augment various aspects of offensive securi…☆879Feb 24, 2026Updated last week
- Subdomain Enumerator and Simple Crawler☆348Feb 12, 2026Updated 2 weeks ago
- EVA is an AI-assisted penetration testing agent that enhances offensive security workflows by providing structured attack guidance, conte…☆380Feb 24, 2026Updated last week
- Curated resources, research, and tools for securing AI systems☆550Updated this week
- This is a local search engine to search for cybersecurity tools. It has 3000+ tools in it's database.☆200Oct 1, 2025Updated 5 months ago
- ☆18Nov 2, 2024Updated last year
- Cisco SmartInstall Exploit [CVE-2018-0171]☆18Feb 6, 2023Updated 3 years ago
- SQL, IIS, Oh My...☆22Feb 24, 2025Updated last year
- NucleiScanner is a Powerful Automation tool for detecting Unknown Vulnerabilities in the Web Applications☆341Mar 26, 2025Updated 11 months ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,314Nov 12, 2025Updated 3 months ago
- ☆45Mar 5, 2025Updated last year
- URILoot is a browser extension designed for Bug Bounty Hunters and Pentesters. Makes fetching uris easy from various sources.☆53Feb 15, 2026Updated 2 weeks ago
- This repository contains the best fuzzing wordlist files☆34Dec 2, 2024Updated last year
- 🛡⚔️AI-Powered Penetration Testing Framework with automated vulnerability scanning, multi-agent system, and compliance reporting🛡⚔️☆222Updated this week
- [ARCHIVED] Evolved into BugTraceAI v2 — github.com/BugTraceAI/BugTraceAI☆239Feb 11, 2026Updated 3 weeks ago
- AI-powered ffuf wrapper☆646Dec 4, 2025Updated 3 months ago
- ☆85May 15, 2025Updated 9 months ago
- Python scripts to convert PfSense and OPNSense firewall rules into a graphical view of the flows.☆412Jan 4, 2026Updated 2 months ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆38Aug 8, 2025Updated 6 months ago
- All-in-one offensive security toolbox with AI agent and MCP architecture. Integrates tools like Nmap, Metasploit, FFUF, SQLMap. Enables p…☆653Jun 5, 2025Updated 9 months ago
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆261Nov 22, 2025Updated 3 months ago
- This tool provides an interactive TUI for reviewing Nessus finding exports, running security tools (nmap, netexec, metasploit), and track…☆63Feb 5, 2026Updated 3 weeks ago
- Find subdomains by searching public certificate records☆16Jun 11, 2024Updated last year
- Clipboard for Command and Control between VDI, RDP and Others on Windows☆50Dec 7, 2025Updated 2 months ago
- Advanced LLM-powered brute-force tool combining AI intelligence with automated login attacks☆1,372Nov 1, 2025Updated 4 months ago
- An advanced AI-driven vulnerability scanner and penetration testing tool that integrates multiple AI providers (OpenAI, Grok, OLLAMA, Cla…☆629Feb 3, 2026Updated last month
- List of some AD tools I frequently use☆56Nov 2, 2025Updated 4 months ago
- Robust Cobalt Strike shellcode loader with multiple advanced evasion features☆200Apr 21, 2025Updated 10 months ago
- ☆45Feb 20, 2026Updated last week
- A modern platform for visual, flexible, and extensible graph-based investigations. For cybersecurity analysts and investigators.☆2,604Feb 16, 2026Updated 2 weeks ago
- A BloodHound collector for Microsoft Configuration Manager☆391Jul 7, 2025Updated 7 months ago
- CVE-2025-49144 PoC for security researchers to test and try.☆86Jun 30, 2025Updated 8 months ago