-
Centuria CyberLabs
- Poland, Italy, USA, Emirates
- centurialabs.pl
- in/cariagbsecurity
- @[email protected]
- All languages
- ASP
- ActionScript
- Assembly
- Batchfile
- BlitzBasic
- C
- C#
- C++
- CSS
- Clojure
- CoffeeScript
- Crystal
- Dockerfile
- Go
- HTML
- Hack
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Lua
- Nim
- Objective-C
- Objective-C++
- PHP
- Pascal
- Perl
- PowerShell
- Python
- Raku
- Ruby
- Rust
- Shell
- Smali
- Smarty
- Standard ML
- Svelte
- Swift
- Text
- TypeScript
- VBA
- VBScript
- Visual Basic
- Visual Basic .NET
- Vue
- YARA
- Zeek
Starred repositories
Shannon Lite is an autonomous, white-box AI pentester for web applications and APIs. It analyzes your source code, identifies attack vectors, and executes real exploits to prove vulnerabilities bef…
Autonomous AI Security Operations — 35 agents replacing $300K/year SOC teams for $50/year
Full vulnerability scanner, Using nmap, nuclei, ChatGPT and Gemini Pro model
Automated web vulnerability scanner powered by GBounty with Katana and Arjun integration
Your personal intelligence agent. Watches the world from multiple data sources and pings you when something changes.
SearXNG is a free internet metasearch engine which aggregates results from various search services and databases. Users are neither tracked nor profiled.
Servo aims to empower developers with a lightweight, high-performance alternative for embedding web technologies in applications.
Official inference framework for 1-bit LLMs
modsecurity audit log analyser and parser
Scan for misconfigured S3 buckets across S3-compatible APIs!
Fully automatic censorship removal for language models
l2ping with threads to flood attack bluetooth devices
Rust crate to retrieve public IP address and geolocation data. 🦀
40,000+ Nuclei templates for security scanning and detection across diverse web applications and services
CVE-2023-38408 SSH Vulnerability Scanner & PoC
CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH
Weighs the soul of incoming HTTP requests to stop AI crawlers
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wis…
0xSojalSec / PentestAgent
Forked from GH05TCREW/pentestagentAll-in-one offensive security toolbox with AI agent and MCP architecture. Integrates tools like Nmap, Metasploit, FFUF, SQLMap. Enables pentesting, bug bounty hunting, threat hunting, and reporting…
Advanced LLM-powered brute-force tool combining AI intelligence with automated login attacks
π RuView: WiFi DensePose turns commodity WiFi signals into real-time human pose estimation, vital sign monitoring, and presence detection — all without a single pixel of video.
A tool to dump a git repository from a website
rapid content discovery tool for recursively querying webservers, handy in pentesting and web application assessments
Fast subdomains enumeration tool for penetration testers