Open-source Claude Code skills, agents, and slash commands for AI-powered penetration testing, bug bounty hunting, and security research
π Quick Start β’ π Documentation β’ π€ Contributing β’ π Website
- Overview
- Key Features
- Architecture
- Use Cases
- Available Tools
- Quick Start
- How It Works
- Contributing
- Security & Legal
- Community
- Roadmap
- License
Transilience AI Community Tools is a comprehensive collection of Claude Code skills, agents, and slash commands for security testing, penetration testing, and bug bounty hunting. This repository provides AI-powered security workflows that run directly in Claude Code, enabling automated vulnerability testing, reconnaissance, and professional security reporting.
This repository provides a complete Claude Code security testing framework:
- π― 7 Security Testing Skills - Pentest, HackerOne, CVE testing, domain assessment, web app mapping
- π€ 35+ Specialized Agents - SQL injection, XSS, SSRF, JWT, OAuth, SSTI, XXE, and more
- π§ 6 Orchestration Agents - Multi-phase coordinators (Pentester, HackerOne Hunter, Git workflows)
- π 14 Slash Commands -
/pentest,/hackerone,/commit,/pr,/issue,/branch,/skiller - π 264+ Lab Walkthroughs - PortSwigger Academy solutions with step-by-step guides
- π Standardized Outputs - Professional reports with CVSS scoring and evidence
- π€ AI-Powered Automation - Claude AI orchestrates intelligent security testing workflows
- π― 35+ Specialized Agents - Parallel vulnerability testing across all OWASP categories
- π Complete OWASP Coverage - 100% OWASP Top 10 + SANS Top 25 CWE testing
- π Professional Reporting - CVSS 3.1, CWE, MITRE ATT&CK, remediation guidance
- π¬ Playwright Integration - Browser automation for client-side vulnerability testing
- π Educational Resources - 264+ lab walkthroughs, 46+ attack type documentation
- π Claude Code Native - Works seamlessly in Claude Code IDE with slash commands
- βοΈ Open Source - MIT licensed for commercial and personal use
This repository provides Claude Code skills, specialized agents, and slash commands for security testing workflows.
graph TB
subgraph "User Interface"
A[Security Researcher<br/>Penetration Tester<br/>Bug Bounty Hunter]
end
subgraph "Claude Code IDE"
B[Slash Commands<br/>/pentest /hackerone /commit]
end
subgraph "Skills Layer .claude/skills/"
C1[Pentest Skill]
C2[HackerOne Skill]
C3[CVE Testing]
C4[Domain Assessment]
C5[Web App Mapping]
C6[Common AppSec]
C7[Authenticating]
end
subgraph "Orchestration Agents .claude/agents/"
D1[Pentester Agent<br/>Multi-phase coordinator]
D2[HackerOne Hunter<br/>Bug bounty workflow]
D3[Git Workflow Agents<br/>Issue/PR/Branch]
D4[Skiller Agent<br/>Skill creation]
end
subgraph "Specialized Agents .claude/agents/specialized/"
E1[SQL Injection]
E2[XSS Testing]
E3[SSRF Detection]
E4[JWT Attack]
E5[OAuth Testing]
E6[SSTI Detection]
E7[XXE Testing]
E8[35+ More Agents]
end
subgraph "Tools & Automation"
F1[Playwright MCP<br/>Browser automation]
F2[HTTP Testing<br/>curl/httpx/requests]
F3[Evidence Capture<br/>Screenshots/Videos]
end
subgraph "Standardized Outputs .claude/output-standards/"
G1[Reconnaissance<br/>inventory/ + analysis/]
G2[Vulnerability Testing<br/>findings/ + evidence/]
G3[Bug Bounty<br/>Platform submissions]
end
A --> B
B --> C1 & C2 & C3 & C4 & C5 & C6 & C7
C1 --> D1
C2 --> D2
C3 & C4 & C5 & C6 --> D1
D1 & D2 --> E1 & E2 & E3 & E4 & E5 & E6 & E7 & E8
E1 & E2 & E3 & E4 & E5 & E6 & E7 & E8 --> F1 & F2 & F3
F1 & F2 & F3 --> G1 & G2 & G3
style B fill:#4CAF50,color:#fff
style D1 fill:#2196F3,color:#fff
style G2 fill:#9C27B0,color:#fff
communitytools/
βββ .claude/
β βββ skills/ # Security testing skills
β β βββ pentest/ # 46+ attack types, 264+ lab walkthroughs
β β βββ hackerone/ # Bug bounty hunting automation
β β βββ cve-testing/ # CVE vulnerability testing
β β βββ domain-assessment/ # Subdomain discovery, port scanning
β β βββ web-application-mapping/ # Endpoint discovery, tech detection
β β βββ common-appsec-patterns/ # OWASP Top 10 testing
β β βββ authenticating/ # Auth testing, 2FA bypass, bot evasion
β β
β βββ agents/ # Orchestration agents
β β βββ pentester.md # Multi-phase pentest coordinator
β β βββ hackerone-hunter.md # Bug bounty workflow orchestrator
β β βββ skiller.md # Skill creation/management
β β βββ git-*.md # Git workflow automation
β β βββ specialized/ # 35+ vulnerability-specific agents
β β βββ sql-injection-agent.md
β β βββ xss-agent.md
β β βββ ssrf-agent.md
β β βββ jwt-agent.md
β β βββ ... (31 more)
β β
β βββ commands/ # Slash commands
β β βββ pentest.md # /pentest command
β β βββ hackerone.md # /hackerone command
β β βββ commit.md # /commit workflow
β β βββ ... (11 total)
β β
β βββ output-standards/ # Standardized output formats
β βββ OUTPUT_STANDARDS.md
β βββ reference/
β
βββ outputs/ # Generated findings and reports
βββ CLAUDE.md # Repository-wide instructions
βββ CONTRIBUTING.md # Contribution guidelines
βββ README.md # This file
sequenceDiagram
participant User
participant Skill as Pentest Skill
participant Orch as Pentester Agent
participant Agents as Specialized Agents
participant Tools as Playwright/HTTP
participant Output as Standardized Outputs
User->>Skill: /pentest https://target.com
Skill->>Orch: Initialize 7-phase workflow
Orch->>Agents: Phase 1-2: Deploy recon agents
Agents->>Tools: Domain assessment, port scanning
Tools-->>Output: inventory/*.json + analysis/*.md
Orch->>Agents: Phase 3-4: Deploy 35+ vuln agents in parallel
Agents->>Tools: SQL/XSS/SSRF/JWT/OAuth testing
Tools-->>Output: findings/*.json + evidence/*.png
Orch->>Output: Phase 5: Generate reports
Output-->>User: Executive + technical reports
Note over Agents,Tools: Specialized agents:<br/>SQL, NoSQL, XSS, SSRF,<br/>JWT, OAuth, SSTI, XXE,<br/>+ 27 more types
Execute comprehensive security assessments using the /pentest command:
# In Claude Code
/pentest
# Deploys 35+ specialized agents to test for:
# - Injection flaws (SQL, NoSQL, Command, SSTI, XXE)
# - Authentication/authorization bypass
# - Client-side attacks (XSS, CSRF, Clickjacking)
# - Server-side vulnerabilities (SSRF, file upload, path traversal)
# - API security issues (GraphQL, REST, JWT, OAuth)
# - Business logic flaws and race conditionsOutput: Professional pentest reports with CVSS scores, remediation guidance, and evidence.
Automate bug bounty workflows with the /hackerone command:
# In Claude Code
/hackerone
# Workflow:
# 1. Parse program scope from CSV/text
# 2. Deploy parallel testing across all in-scope assets
# 3. Validate proof-of-concept for each finding
# 4. Generate platform-ready submission reports
# 5. Auto-categorize severity and impactOutput: HackerOne/Bugcrowd-formatted submissions with PoC, impact analysis, and reproduction steps.
Test applications for known CVEs:
# In Claude Code
# Example: Test for specific CVE
"Test this application for CVE-2023-XXXX"
# The cve-testing skill:
# 1. Identifies technology stack
# 2. Researches applicable CVEs
# 3. Deploys exploitation attempts
# 4. Validates with proof-of-concept
# 5. Documents findingsOutput: CVE validation reports with exploit status and remediation steps.
Comprehensive web app security testing:
# Phase 1: Reconnaissance
/domain-assessment # Subdomain discovery, port scanning
/web-application-mapping # Endpoint discovery, tech detection
# Phase 2: Vulnerability Testing
/common-appsec-patterns # OWASP Top 10 testing
/authenticating # Authentication testing, 2FA bypass
# Phase 3: Full Pentest
/pentest # Complete security assessmentOutput: Multi-phase reports with attack surface inventory β vulnerability findings β remediation roadmap.
46+ attack types, 264+ PortSwigger lab walkthroughs, 35+ specialized agents
Orchestrates a complete 7-phase penetration test using specialized vulnerability agents:
Vulnerability Coverage:
- Injection: SQL, NoSQL, Command, SSTI, XXE, LDAP/XPath
- Client-Side: XSS (Reflected/Stored/DOM), CSRF, Clickjacking, CORS, Prototype Pollution
- Server-Side: SSRF, HTTP Smuggling, File Upload, Path Traversal, Deserialization
- Authentication: Auth Bypass, JWT, OAuth, Password Attacks, Session Fixation
- API Security: GraphQL, REST API, WebSockets, Web LLM
- Business Logic: Logic Flaws, Race Conditions, Access Control, Cache Poisoning/Deception
- Web Apps: IDOR, Host Header Injection, Information Disclosure
Features:
- π€ 35+ Specialized Agents deployed in parallel
- π 264+ Lab Walkthroughs from PortSwigger Academy
- π― OWASP Top 10 complete coverage
- π¬ Playwright Automation for browser-based testing
- π Professional Reports with CVSS 3.1 scoring
- π¨ Evidence Capture (screenshots, videos, HTTP logs)
Automated bug bounty workflow from scope parsing to submission
- Parse program scope (CSV/text/wildcards)
- Parallel testing across all in-scope assets
- Automated PoC validation
- Platform-ready submission reports (HackerOne, Bugcrowd)
- CVSS scoring and impact analysis
- Subdomain discovery (multiple sources)
- Port scanning and service detection
- Technology stack identification
- Attack surface inventory
- Testing checklist generation
- Passive browsing and spidering
- Active endpoint discovery
- Technology detection
- Headless browser automation
- Comprehensive application mapping
- Technology stack identification
- CVE research and matching
- Automated exploitation attempts
- PoC validation
- Vulnerability documentation
Quick-hit testing for common web application vulnerabilities:
- XSS, SQL injection, SSRF patterns
- Authentication/authorization flaws
- Security misconfigurations
- Client-side security issues
- Signup/login workflow testing
- 2FA/MFA bypass techniques
- CAPTCHA solving
- Bot detection evasion
- Behavioral biometrics simulation
- OTP handling
Auto-generate conventional commit messages and create commits
Create PRs with auto-generated descriptions linking to issues
Generate well-formatted GitHub issues with templates
Create branches following conventional naming patterns
Create, update, or remove Claude Code skills with GitHub workflow integration
Use the /skiller command to create your own security testing skills:
# In Claude Code
/skiller
# Interactive workflow:
# 1. Choose: CREATE, UPDATE, or REMOVE
# 2. Provide skill details (name, description, agents)
# 3. Select GitHub workflow (optional)
# 4. Auto-generates: structure, documentation, validation
# 5. Creates: issue, branch, commit, PRSkill Structure:
.claude/skills/your-skill/
βββ skill.md # Skill definition
βββ CLAUDE.md # Context for Claude
βββ README.md # User documentation
βββ agents/ # Specialized agents (optional)
- Claude Code - AI-powered IDE by Anthropic (Install Claude Code)
- Git - For cloning the repository
- Written Authorization - Always get permission before testing any systems
Step 1: Clone the Repository
git clone https://github.com/transilienceai/communitytools.git
cd communitytoolsStep 2: Open in Claude Code
# Open the repository in Claude Code
claude-code .
# Or open Claude Code and use: File β Open Folder β Select communitytools/Step 3: Skills Auto-Load
Claude Code automatically discovers skills in .claude/skills/ and commands in .claude/commands/. No additional configuration needed!
Run a Penetration Test:
# In Claude Code chat:
/pentest
# Or provide specific instructions:
"Run a comprehensive pentest on https://testsite.com (I have written authorization)"Bug Bounty Hunting:
# In Claude Code chat:
/hackerone
# Then provide program details or scope file:
"Here's the HackerOne program scope: [paste CSV/text]"Reconnaissance:
/domain-assessment
# Discovers subdomains, ports, services, technologies
/web-application-mapping
# Maps endpoints, parameters, application structureQuick Vulnerability Testing:
/common-appsec-patterns
# Tests for OWASP Top 10 vulnerabilities
/authenticating
# Tests authentication, 2FA, CAPTCHA, bot detectionDevelopment Workflow:
/skiller # Create/update skills
/issue # Create GitHub issues
/branch # Create feature branches
/commit # Auto-generate commit messages
/pr # Create pull requests# 1. Open Claude Code and load this repository
claude-code /path/to/communitytools
# 2. In the Claude Code chat, try:
/pentest
# 3. Claude will ask for:
# - Target URL/application
# - Authorization confirmation
# - Testing scope (subdomains, specific paths, etc.)
# - Authentication credentials (if needed)
# 4. The pentester agent will:
# - Deploy 35+ specialized vulnerability agents
# - Test in parallel across all vulnerability categories
# - Generate findings in outputs/ directory
# - Create professional reports with evidence
# 5. Review outputs:
# outputs/pentest/<target>/
# βββ findings/ # JSON + markdown vulnerability reports
# βββ evidence/ # Screenshots, videos, HTTP logs
# βββ reports/ # Executive + technical reportsThis repository implements a three-layer architecture:
- Skills Layer (
.claude/skills/) - User-facing workflows invoked via slash commands - Agents Layer (
.claude/agents/) - Orchestrators and specialized testing agents - Tools Layer - Playwright MCP, HTTP clients, evidence capture
flowchart TB
subgraph "1οΈβ£ User Invokes Skill"
A["/pentest<br/>/hackerone<br/>/domain-assessment"]
end
subgraph "2οΈβ£ Skill Loads Context"
B1[Load SKILL.md]
B2[Load CLAUDE.md]
B3[Define methodology]
end
subgraph "3οΈβ£ Deploy Orchestrator Agent"
C1[Pentester Agent]
C2[HackerOne Hunter]
C3[Domain Assessor]
end
subgraph "4οΈβ£ Spawn Specialized Agents in Parallel"
D1[SQL Injection Agent]
D2[XSS Agent]
D3[SSRF Agent]
D4[JWT Agent]
D5[35+ More Agents]
end
subgraph "5οΈβ£ Execute Tests with Tools"
E1[Playwright<br/>Browser automation]
E2[HTTP Testing<br/>curl/httpx/requests]
E3[Evidence Capture<br/>Screenshots/Videos]
end
subgraph "6οΈβ£ Generate Standardized Outputs"
F1[findings/<br/>JSON + markdown]
F2[evidence/<br/>Screenshots/videos]
F3[reports/<br/>Executive/technical]
end
A --> B1 & B2 & B3
B1 & B2 & B3 --> C1 & C2 & C3
C1 & C2 & C3 --> D1 & D2 & D3 & D4 & D5
D1 & D2 & D3 & D4 & D5 --> E1 & E2 & E3
E1 & E2 & E3 --> F1 & F2 & F3
style A fill:#4CAF50,color:#fff
style C1 fill:#2196F3,color:#fff
style F3 fill:#9C27B0,color:#fff
User: /pentest (in Claude Code)
Step 1: Skill Loads
- Reads
.claude/skills/pentest/skill.mdfor methodology - Loads
.claude/skills/pentest/CLAUDE.mdfor context - Identifies 46+ attack types and 264+ lab walkthroughs
Step 2: Pentester Agent Deploys
- Reads
.claude/agents/pentester.mdfor orchestration logic - Implements 7-phase PTES methodology
- Coordinates parallel agent deployment
Step 3: Specialized Agents Execute
Pentester Agent spawns in parallel:
ββ SQL Injection Agent (.claude/agents/specialized/sql-injection-agent.md)
ββ XSS Agent (.claude/agents/specialized/xss-agent.md)
ββ SSRF Agent (.claude/agents/specialized/ssrf-agent.md)
ββ JWT Agent (.claude/agents/specialized/jwt-agent.md)
ββ OAuth Agent (.claude/agents/specialized/oauth-agent.md)
ββ 30+ more agents...
Step 4: Tools Execute Tests
- Playwright MCP: Browser-based testing (XSS, CSRF, Clickjacking, Auth)
- HTTP Testing: Server-side vulnerabilities (SQL, SSRF, XXE, File Upload)
- Evidence Capture: Screenshots at each test step, HTTP request/response logs
Step 5: Outputs Generated
outputs/pentest/<target>/
βββ findings/
β βββ findings.json # Machine-readable (CVSS, CWE, OWASP)
β βββ finding-001.md # SQL injection in login
β βββ finding-002.md # Stored XSS in comments
β βββ finding-003.md # JWT signature bypass
βββ evidence/
β βββ screenshots/ # Visual proof
β βββ videos/ # Exploitation recordings
β βββ http-logs/ # Request/response captures
βββ reports/
β βββ executive-summary.md # Business impact
β βββ technical-report.md # Complete findings
βββ metadata.json # Testing details
All skills follow OUTPUT_STANDARDS.md (.claude/output-standards/):
| Output Type | Directory Structure | Use Case |
|---|---|---|
| Reconnaissance | inventory/ + analysis/ |
Domain assessment, web app mapping |
| Vulnerability Testing | findings/ + evidence/ + reports/ |
Pentest, CVE testing, AppSec patterns |
| Bug Bounty | Platform-ready submissions | HackerOne, Bugcrowd formatted |
Key Features:
- β CVSS 3.1 scoring
- β CWE mapping
- β OWASP Top 10 categorization
- β MITRE ATT&CK TTPs
- β Remediation guidance
- β Evidence-based validation
We welcome contributions from the security community! Whether you're fixing a bug, improving documentation, or adding new security testing capabilities, your help makes these tools better for everyone.
|
π Report Issues
|
π» Contribute Code
|
π Improve Docs
|
Automated Workflow (Recommended):
# Use the /skiller command for automated contribution workflow
/skiller
# Interactive prompts will:
# 1. Create GitHub issue
# 2. Create feature branch (via git-branch-manager agent)
# 3. Generate skill structure and documentation
# 4. Create commit with conventional format (via git-issue-creator)
# 5. Create pull request linking to issue (via git-pr-creator)Manual Workflow:
flowchart TD
A[Fork Repository] --> B[Create Issue<br/>/issue or gh issue create]
B --> C[Create Branch<br/>/branch feature/skill-name]
C --> D[Develop Skill<br/>Add agents, docs, tests]
D --> E[Test in Claude Code<br/>Invoke skill, validate outputs]
E --> F{Tests Pass?}
F -->|No| D
F -->|Yes| G[Create Commit<br/>/commit]
G --> H[Push to Fork]
H --> I[Create PR<br/>/pr with issue link]
I --> J{Code Review}
J -->|Changes Requested| D
J -->|Approved| K[Merged! π]
style K fill:#4CAF50,color:#fff
style C fill:#2196F3,color:#fff
style G fill:#FF9800,color:#fff
Git Workflow Agents:
/issue- Creates well-formatted GitHub issues/branch- Creates conventional branches (feature/, bugfix/, docs/)/commit- Auto-generates conventional commit messages/pr- Creates PRs with auto-generated descriptions linking to issues
Read the full guide: CONTRIBUTING.md
New to contributing? Check out our Good First Issues to get started!
flowchart TB
A{Do you have written authorization?}
A -->|Yes| B[β
Legal Use]
A -->|No| C[β ILLEGAL - DO NOT USE]
B --> D[Authorized Pentesting]
B --> E[Bug Bounty Programs]
B --> F[Security Research]
B --> G[CTF Competitions]
B --> H[Your Own Systems]
C --> I[Unauthorized Access = CRIME]
C --> J[Legal Consequences]
C --> K[Criminal Prosecution]
style B fill:#4CAF50,color:#fff
style C fill:#F44336,color:#fff
style I fill:#F44336,color:#fff
style J fill:#F44336,color:#fff
style K fill:#F44336,color:#fff
β Authorized & Legal Use:
- Penetration testing with written authorization
- Bug bounty programs within scope
- Security research on your own systems
- CTF competitions and training environments
- Educational purposes with proper permissions
β Prohibited & Illegal Use:
- Unauthorized testing of any systems
- Malicious exploitation of vulnerabilities
- Data theft or system disruption
- Testing without explicit written permission
- Any use that violates local or international laws
Users are solely responsible for compliance with all applicable laws and regulations.
If you discover a vulnerability using these tools:
- Do not exploit beyond proof-of-concept
- Report immediately to the vendor/organization
- Follow responsible disclosure timelines (typically 90 days)
- Document thoroughly for remediation
- Share knowledge after resolution (if permitted)
Transilience AI is a leading AI-powered security company specializing in:
- π€ Autonomous Security Testing - AI-driven penetration testing and vulnerability assessment
- π Threat Intelligence - Real-time threat detection and analysis
- π‘οΈ AI Security Operations - Intelligent incident response and security automation
- π Compliance Management - Automated compliance monitoring and reporting
- π― Vulnerability Research - Zero-day discovery and security research
We believe in giving back to the security community by open-sourcing our tools and frameworks.
- π¬ GitHub Discussions - Ask questions, share ideas
- π GitHub Issues - Report bugs, request features
- π Website - Company information and commercial products
- π§ Email - Direct support for enterprise users
- β Star this repository to get updates
- π Watch releases for new versions
- π¦ Follow us on social media for news and updates
- π° Read our blog for security insights
Released Skills:
- β Pentest Skill - 46+ attack types, 264+ lab walkthroughs, 35+ specialized agents
- β HackerOne Skill - Bug bounty automation from scope parsing to submission
- β CVE Testing - Vulnerability testing and exploitation framework
- β Domain Assessment - Subdomain discovery and port scanning
- β Web App Mapping - Endpoint discovery and technology detection
- β Common AppSec Patterns - OWASP Top 10 testing
- β Authenticating - Auth testing, 2FA bypass, bot evasion
- β Git Workflow Agents - Issue, branch, commit, PR automation
- β Skiller Agent - Skill creation and management
Q1 2026
- Enhanced CVE Database Integration - Automated CVE-to-test mapping
- Burp Suite Integration Skill - Export/import findings from Burp
- Nuclei Template Skill - Convert Nuclei templates to agent workflows
- OWASP ZAP Integration - ZAP API integration for automation
Q2 2026
- Cloud Security Skills - AWS, Azure, GCP misconfigurations
- Container Security Skill - Docker and Kubernetes testing
- Mobile Security Skill - iOS and Android app testing
- API Security Enhancement - gRPC, WebSocket advanced testing
Q3 2026
- Compliance Reporting - PCI-DSS, SOC 2, ISO 27001 report generation
- AI/ML Security Skill - LLM prompt injection, model poisoning
- Blockchain Security - Smart contract auditing agents
- IoT Security Skill - Firmware and embedded device testing
Community Contributions Welcome:
- π― New specialized vulnerability agents
- π Additional lab walkthroughs and tutorials
- π§ Tool integrations (Metasploit, Nmap, etc.)
- π Bug bounty platform integrations (Bugcrowd, Intigriti, YesWeHack)
- π Enhanced reporting templates
Vote on features: Feature Requests
Repository Metrics:
| Category | Count | Description |
|---|---|---|
| π― Security Skills | 7 | Main security testing workflows |
| π€ Specialized Agents | 35+ | Vulnerability-specific testing agents |
| π§ Orchestration Agents | 6 | Workflow coordinators (pentest, hackerone, git) |
| π Slash Commands | 14 | User-invocable commands |
| π Lab Walkthroughs | 264+ | PortSwigger Academy solutions |
| π Attack Types | 46+ | Documented exploitation techniques |
| π Output Standards | 3 | Standardized formats (recon, vuln, bounty) |
Vulnerability Coverage:
- β OWASP Top 10 (2021) - 100% coverage
- β SANS Top 25 CWE - 90%+ coverage
- β MITRE ATT&CK TTPs - Mapped for all findings
- β CVSS 3.1 Scoring - All vulnerability findings
These tools are made possible by:
- π The amazing global security research community
- π οΈ Open-source security tool developers and maintainers
- π€ Claude AI by Anthropic for powering our AI capabilities
- πΌ Our customers and partners who provide invaluable feedback
- π₯ Contributors who make these tools better every day
We'd like to give special recognition to:
- OWASP Foundation for security standards
- Bug bounty platforms (HackerOne, Bugcrowd, Synack)
- Security researchers who responsibly disclose vulnerabilities
- The open-source community for their continuous support
All tools in this repository are licensed under the MIT License unless otherwise specified. See LICENSE file for details.
MIT License - Copyright (c) 2025 Transilience AI
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is furnished
to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
What this means:
- β Commercial use allowed
- β Modification allowed
- β Distribution allowed
- β Private use allowed
β οΈ No warranty providedβ οΈ No liability accepted
This project exists thanks to all the people who contribute!
Want to see your name here? Check out our Contributing Guide!
If you find these tools useful, please consider:
Built with β€οΈ by Transilience AI
β Star this repo to support open-source security tools! β
Website β’ Tools β’ Report Issue β’ Discussions
claude-code claude-ai ai-security penetration-testing security-testing bug-bounty owasp vulnerability-scanner pentesting-tools security-automation ethical-hacking cybersecurity infosec appsec web-security api-security security-research vulnerability-assessment security-tools open-source-security devsecops playwright-automation hackerone bugcrowd portswigger bscp oscp multi-agent ai-agents