Penetration Testing AI Assistant based on open source LLMs.
-
Updated
Nov 6, 2024 - Python
Penetration Testing AI Assistant based on open source LLMs.
Advanced Dorking Framework for Recon
Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management
PWN is an open security automation framework that aims to stand on the shoulders of security giants, promoting trust and innovation.
A small set of tools to convert packets from capture files to hash files for use with Hashcat or John the Ripper.
An Information Security (InfoSec) blog/site. Learn ethical hacking, penetration testing, digital forensics and anything related to cyber security.
CHOMTE.SH is a powerful shell script designed to automate reconnaissance tasks during penetration testing. It utilizes various Go-based tools to gather information and identify the attack surface, making it a valuable asset for bug bounty hunters and penetration testers.
Small tool to capture packets from wlan devices.
A comprehensive tool designed for ethical hackers and security professionals, featuring various modules for password attacks, bruteforcing, information gathering, exploit execution, and web vulnerability scanning. This framework enables users to assess and identify potential security weaknesses
fsociety Hacking Tools Pack – A Penetration Testing Framework
DARKARMY Hacking Tools Pack - A Penetration Testing Framework .
All in One Hacking Tool for Linux & Android (Termux). Make your linux environment into a Hacking Machine. Hackers are welcome in our blog
Red Devil Networks - CnC framework
Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized environments.
Automated Security Testing For REST API's
Overlord - Red Teaming Infrastructure Automation
fsociety is a penetration toolkit inspired from MR. ROBOT
Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing standard penetration testing tools. The collected data is internally stored in a structured manner to allow the fast identification and visualisation of the collected information.
Skilled and experienced cybersecurity analyst in identifying and mitigating security threats, Penetration testing, and developing security protocols.Excellent problem-solving and analytical skills,with a commitment to staying current on industry trends and best practices. Looking to leverage expertise in a challenging & dynamic cybersecurity roles
Add a description, image, and links to the penetration-testing-framework topic page so that developers can more easily learn about it.
To associate your repository with the penetration-testing-framework topic, visit your repo's landing page and select "manage topics."