A customizable and powerful penetration testing reporting platform for offensive security professionals. Simplify, customize, and automate your pentest reports with ease.
-
Updated
Apr 21, 2026 - Python
A customizable and powerful penetration testing reporting platform for offensive security professionals. Simplify, customize, and automate your pentest reports with ease.
MCP server for AI agent for cybersecurity: automate assessment of documents, questionnaires & reports. Multi-format parsing, RAG knowledge base,Risks, compliance gaps, remediations.
MAES: M365 Analyzer & Extractor Suite Po
NIST Cybersecurity Framework (CSF) Profile Assessment Tool - Track controls, assign ownership, document findings, score security states, and export for visualization
RoboMate-Cloud-Automation
PowerShell security reporting framework for Microsoft 365 identity posture assessment. Analyzes Authentication Context, PIM, Conditional Access & more.
AI-powered security research assistant for Claude Code — structured assessment workflows, tool orchestration, and professional reporting across recon, enumeration, vulnerability scanning, and secrets auditing. Built for security researchers and bug bounty hunters who want Claude as an analyst, not a command generator.
GitIntel is a robust GitHub OSINT tool crafted to reveal concealed insights from GitHub repositories and user profiles. Its capabilities make it an invaluable resource for ethical hacking, security assessments, and intelligence gathering in the realm of software development.
MottaHunter: Advanced email reconnaissance tool for security professionals. Hunt emails across Google, Twitter, and LinkedIn, validate via SMTP, and generate smart permutations. Features rate limiting, catch-all detection, and permutation splitting for stealth operations.
Rogue.sh is an automated Bash script for Linux systems that performs Nmap scans, sets up Metasploit, exploits vulnerabilities, downloads sensitive files, gathers credentials, and executes post-exploitation tasks, providing a comprehensive overview of a target system's vulnerabilities and security measures.
Cross-platform mobile device analysis framework for Android and iOS security research, penetration testing, and forensic analysis. Python-based toolkit with comprehensive device introspection, vulnerability scanning, and advanced manipulation capabilities.
PowerShell toolkit for assessing DES/RC4 Kerberos encryption in Active Directory. Detects weak encryption across domain controllers, trusts, and event logs. Built for the January 2026 update and July 2026 RC4 removal deadlines.
AWS security assessment platform with AI-powered analysis
Powerful Python SSH brute force tool with multi-threaded architecture, advanced honeypot detection, real-time statistics, and system reconnaissance. Perfect for authorized security testing and penetration testing.
WindowsNinja - Unleash the Power of Windows System Information Gathering! 🖥️🕵️✨ Harness the capabilities of WindowsNinja to silently gather detailed information about your Windows system. Analyze your system's defenses, expose configurations. 🕵️♂️💻 Dive into the depths of your Windows environment with WindowsNinja.
Open-source intelligence analysis of a government minister identifying sensitive publicly available information, threat actor exploitation vectors, and OSINT methodology for risk assessment.
Professional web vulnerability assessment platform with automated XSS and SQL injection detection. Built with Python/Flask featuring real-time scanning dashboard and comprehensive security reporting.
AI agent discovery and security assessment platform with vulnerability testing, risk scoring, and compliance mapping
Guide for conducting security assessments focused on identifying conditions that enable privilege escalation in Linux systems.
Add a description, image, and links to the security-assessment topic page so that developers can more easily learn about it.
To associate your repository with the security-assessment topic, visit your repo's landing page and select "manage topics."