0ca / BoxPwnrLinks
An experimental project exploring the use of Large Language Models (LLMs) to solve HackTheBox machines autonomously.
☆149Updated this week
Alternatives and similar repositories for BoxPwnr
Users that are interested in BoxPwnr are comparing it to the libraries listed below
Sorting:
- A research project to add some brrrrrr to Burp☆194Updated 9 months ago
- Verizon Burp Extensions: AI Suite☆141Updated 6 months ago
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆79Updated 6 months ago
- ☆81Updated this week
- ☆116Updated 2 years ago
- ☆39Updated last week
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆59Updated 2 months ago
- Create honeypots for cloud environments☆103Updated last month
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆103Updated 2 months ago
- Automated vulnerability discovery and annotation☆67Updated last year
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Updated 8 months ago
- https://lolad-project.github.io/☆82Updated 10 months ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated last year
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated last year
- External Playbooks for Public Access☆40Updated 9 months ago
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆38Updated 2 months ago
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆106Updated last year
- Hijack a slack bot to phish your way in☆57Updated 4 months ago
- source code for the offsecml framework☆43Updated last year
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆108Updated 3 months ago
- Examine Chrome extensions for security issues☆87Updated this week
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆145Updated 11 months ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆41Updated 4 months ago
- gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post mess…☆79Updated 5 months ago
- PoC for CVE-Requested vulnerability in Amazon ECS (EC2 launch type) allowing cross-task IAM credential theft.☆45Updated 3 months ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆37Updated last year
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆270Updated 6 months ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆104Updated 5 months ago
- ☆63Updated last week
- ☆90Updated last month