Lists (3)
Sort Name ascending (A-Z)
Stars
Open-source AI agents for penetration testing
12 Lessons to Get Started Building AI Agents
Implement a reasoning LLM in PyTorch from scratch, step by step
A workshop that teaches you how to build your own coding agent. Similar to Roo code, Cline, Amp, Cursor, Windsurf or OpenCode.
AGENTS.md — a simple, open format for guiding coding agents
HexStrike AI MCP Agents is an advanced MCP server that lets AI agents (Claude, GPT, Copilot, etc.) autonomously run 150+ cybersecurity tools for automated pentesting, vulnerability discovery, bug b…
AnyCrawl 🚀: A Node.js/TypeScript crawler that turns websites into LLM-ready data and extracts structured SERP results from Google/Bing/Baidu/etc. Native multi-threading for bulk processing.
Overflowme is a walkthrough to learn the basics of binary exploitation. Detailed instructions, stack diagrams and fully commented assembly source code are provided for each of the challenges. There…
Quickly create and run optimised Windows, macOS and Linux virtual machines
MCP server for querying the Shodan API
A Model Context Protocol server that provides access to Shodan API functionality
Scripted Local Linux Enumeration & Privilege Escalation Checks
The OWASP Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes technical processes for verifying the OWA…
All-in-one AI automation platform (workflows, agents, cases, tables) for security, IT, and infra teams.
Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP
A utility for arming (creating) many bees (micro EC2 instances) to attack (load test) targets (web applications).
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
Stash for Binary Exploitation and Reverse Engineering Resources
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
List of payloads and wordlists that are specifically crafted to identify and exploit vulnerabilities in target web applications.
Prevent cloud misconfigurations and find vulnerabilities during build-time in infrastructure as code, container images and open source packages with Checkov by Bridgecrew.
🛡️ Open-source and next-generation Web Application Firewall (WAF)