- 864
- 43
White Rabbit Neo Hacker GPT
Designed for offensive analysis, this GPT excels at finding vulnerabilities, exploiting them, automating security scripts, and suggesting contextual exploits.
Think of it as a virtual Red Team member who can assist with both DevSecOps pipelines and custom attack techniques.
It can auto-generate exploit code snippets and automate reconnaissance tasks with scripts in Bash, Python, or PowerShell.
KaliGPT
Built to support Kali Linux users, KaliGPT helps generate custom payloads, guides users through the use of classic penetration testing tools (such as Metasploit and Hydra), and explains attack techniques step by step.
Ideal for new and seasoned pentesters alike, this GPT assists with command-line syntax, tool choice, and even reports on successful exploits.
OSINT GPT
Automates open-source intelligence (OSINT) gathering: scanning for leaked data, mapping social networks, finding exposed domains, and tracking public IPs.
OSINT GPT can invoke search engine dorking, automate WHOIS lookups, and create profiles for social engineering or footprinting campaigns, all while maintaining efficiency and compliance.
WormGPT
An AI model designed to generate social engineering text, phishing content, and Business Email Compromise (BEC) scams.
While primarily used by security professionals for research and defense, it’s important to note that WormGPT is also abused by cybercriminals.
It generates emails, SMS phishing lures, and fake login pages with high accuracy for red/blue team simulations.
PentestGPT
Automates penetration testing steps, from reconnaissance (e.g., nmap -A target.com) and vulnerability scanning to exploitation and report generation.
PentestGPT follows established methodologies like the OWASP Top 10, helping analysts save time while thoroughly testing networks and applications.
FraudGPT
This controversial AI aids in the design and simulation of scams, cloned credit cards, and fake websites for research purposes.
Used in controlled environments, FraudGPT helps test fraud detection systems and study social engineering vectors. Warning: This tool is highly sensitive and must only be used for ethical research.
MalwareDev GPT
A lab-focused tool for developing and analyzing malware variants, obfuscating code, and testing evasion against antivirus and EDRs.
MalwareDev GPT writes polymorphic malware, creates custom payloads, and deconstructs binaries for defensive research and malware analysis training.
Bug Hunter GPT
Automates the discovery of vulnerabilities in web applications, generates Proof of Concepts (PoCs), and simulates real-world attacks for bug bounty programs.
Bug Hunter GPT can identify XSS, SQL injection, and CSRF vulnerabilities, providing step-by-step exploitation chains and remediation guidance.
BlueTeam Defender GPT
A powerful ally for defenders, it simulates attacks, tests SIEM correlation rules, and provides incident response playbooks.
It can help with writing detection rules (YARA/Sigma), firewall configurations, and conducting purple team exercises for enhanced preparedness.
ExploitBuilder GPT
It specializes in creating, modifying, and adapting exploits for known CVEs.
ExploitBuilder GPT can convert proof-of-concept code from public advisories into working exploits and tailor them to specific targets, greatly enhancing threat modeling and penetration testing efforts.
Designed for offensive analysis, this GPT excels at finding vulnerabilities, exploiting them, automating security scripts, and suggesting contextual exploits.
Think of it as a virtual Red Team member who can assist with both DevSecOps pipelines and custom attack techniques.
It can auto-generate exploit code snippets and automate reconnaissance tasks with scripts in Bash, Python, or PowerShell.
KaliGPT
Built to support Kali Linux users, KaliGPT helps generate custom payloads, guides users through the use of classic penetration testing tools (such as Metasploit and Hydra), and explains attack techniques step by step.
Ideal for new and seasoned pentesters alike, this GPT assists with command-line syntax, tool choice, and even reports on successful exploits.
OSINT GPT
Automates open-source intelligence (OSINT) gathering: scanning for leaked data, mapping social networks, finding exposed domains, and tracking public IPs.
OSINT GPT can invoke search engine dorking, automate WHOIS lookups, and create profiles for social engineering or footprinting campaigns, all while maintaining efficiency and compliance.
WormGPT
An AI model designed to generate social engineering text, phishing content, and Business Email Compromise (BEC) scams.
While primarily used by security professionals for research and defense, it’s important to note that WormGPT is also abused by cybercriminals.
It generates emails, SMS phishing lures, and fake login pages with high accuracy for red/blue team simulations.
PentestGPT
Automates penetration testing steps, from reconnaissance (e.g., nmap -A target.com) and vulnerability scanning to exploitation and report generation.
PentestGPT follows established methodologies like the OWASP Top 10, helping analysts save time while thoroughly testing networks and applications.
FraudGPT
This controversial AI aids in the design and simulation of scams, cloned credit cards, and fake websites for research purposes.
Used in controlled environments, FraudGPT helps test fraud detection systems and study social engineering vectors. Warning: This tool is highly sensitive and must only be used for ethical research.
MalwareDev GPT
A lab-focused tool for developing and analyzing malware variants, obfuscating code, and testing evasion against antivirus and EDRs.
MalwareDev GPT writes polymorphic malware, creates custom payloads, and deconstructs binaries for defensive research and malware analysis training.
Bug Hunter GPT
Automates the discovery of vulnerabilities in web applications, generates Proof of Concepts (PoCs), and simulates real-world attacks for bug bounty programs.
Bug Hunter GPT can identify XSS, SQL injection, and CSRF vulnerabilities, providing step-by-step exploitation chains and remediation guidance.
BlueTeam Defender GPT
A powerful ally for defenders, it simulates attacks, tests SIEM correlation rules, and provides incident response playbooks.
It can help with writing detection rules (YARA/Sigma), firewall configurations, and conducting purple team exercises for enhanced preparedness.
ExploitBuilder GPT
It specializes in creating, modifying, and adapting exploits for known CVEs.
ExploitBuilder GPT can convert proof-of-concept code from public advisories into working exploits and tailor them to specific targets, greatly enhancing threat modeling and penetration testing efforts.