freshcrate

Search results for "hacking"

12 results found
CL4R1T4SπŸ“main@2026-04-17🌳 Mature⭐14,071

LEAKED SYSTEM PROMPTS FOR CHATGPT, GEMINI, GROK, CLAUDE, PERPLEXITY, CURSOR, DEVIN, REPLIT, AND MORE! - AI SYSTEMS TRANSPARENCY FOR ALL! πŸ‘

redamonπŸ“v4.0.0🌿 Growing⭐1,728

An AI-powered agentic red team framework that automates offensive security operations, from reconnaissance to exploitation to post-exploitation, with zero human intervention.

Autonomous-AgentsπŸ“main@2026-04-16🌿 Growing⭐1,211

Autonomous Agents (LLMs) research papers. Updated Daily.

claude-bug-bountyπŸ“v4.0.0🌿 Growing⭐1,690

AI-powered bug bounty hunting from your terminal - recon, 20 vuln classes, autonomous hunting, and report generation. All inside Claude Code.

Anthropic-Cybersecurity-SkillsπŸ“v1.2.0🌱 Seedling⭐4,262

754 structured cybersecurity skills for AI agents Β· Mapped to 5 frameworks: MITRE ATT&CK, NIST CSF 2.0, MITRE ATLAS, D3FEND & NIST AI RMF Β· agentskills.io standard Β· Works with Claude Code, GitHub Cop

SploitGPTπŸ“main@2026-04-21🌱 Seedling⭐7

πŸ› οΈ Automate penetration testing with SploitGPT, an AI agent using Kali Linux tools for efficient security assessments and minimal user input.

Pentest-SkillπŸ“0.0.0🌱 Seedling⭐2

Transform any LLM into an autonomous security testing agent with structured prompts for seven-phase vulnerability hunting.

Zen-Ai-PentestπŸ“v3.0.0🌱 Seedling⭐279

πŸ›‘βš”οΈAI-Powered Penetration Testing Framework with automated vulnerability scanning, multi-agent system, and compliance reportingπŸ›‘βš”οΈ

Advanced-AI-AgentsπŸ“main@2026-04-21🌱 Seedling⭐2

πŸ€– Build advanced AI agents with a collection of production-ready applications using modern frameworks for single and multi-agent systems.

claude-agent-serverπŸ“main@2026-04-21🌱 Seedling⭐2

⚑ Enable real-time communication with Claude using this WebSocket server, designed for easy deployment and integration with the Claude Agent SDK.

RedTeam-MCPπŸ“main@2026-04-21🌱 Seedling⭐2

Automate red teaming by using AI to plan attacks, run security tools, move laterally, and escalate privileges in network environments.