Stars
AutoGPT is the vision of accessible AI for everyone, to use and to build on. Our mission is to provide the tools, so that you can focus on what matters.
Langflow is a powerful tool for building and deploying AI-powered agents and workflows.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Interact with your documents using the power of GPT, 100% privately, no data leaks
The recursive internet scanner for hackers. 🧡
Cybersecurity AI (CAI), the framework for AI Security
AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.
"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.
💰 Cryptocurrency Trading Bot for Binance (Experimental)
Zero shot vulnerability discovery using LLMs
Generates permutations, alterations and mutations of subdomains and then resolves them
gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, Github, Mailgun, Facebook, Twitter, Heroku, Stripe...
DNSGen is a powerful and flexible DNS name permutation tool designed for security researchers and penetration testers. It generates intelligent domain name variations to assist in subdomain discove…
A simple Burp Suite extension to crawl JavaScript (JS) files in passive mode and display the results directly on the issues
A lightweight GPT model, trained to discover subdomains.
Dashboard to collect, analyze, and respond to reported phishing emails.
Monitoring framework to detect and report newly found subdomains on a specific target using various scanning tools
A Tool To Leverage Virus Total's Private API Key
♾️ toolkit for air-gapped LLMs on consumer-grade hardware
A Burp Suite extension to extract datas from source code while browsing.
Unsecure time-based secret exploitation and Sandwich attack implementation Resources
Recursive DNS Subdomain Enumerator with dead-end avoidance system (BETA)
Volatility plugin to retrieve the Full Volume Encryption Key in memory. The FVEK can then be used with the help of Dislocker to mount the volume.
An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.
A simple tool to decloak/expose the bucket name behind a domain.
The domain enumeration and scanning tool for hackers