source code for the offsecml framework
☆45Jun 6, 2024Updated last year
Alternatives and similar repositories for offsecml
Users that are interested in offsecml are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Jun 20, 2023Updated 2 years ago
- ☆14Jun 15, 2024Updated last year
- Scripts to automate standing up C2 infra with firewall settings inside of DigitalOcean.☆18Feb 5, 2021Updated 5 years ago
- Intel Retrieval Augmented Generation (RAG) Utilities☆90Jan 29, 2024Updated 2 years ago
- ☆66Jan 17, 2026Updated 4 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- CVE-2023-50254: PoC Exploit for Deepin-reader RCE that affects unpatched Deepin Linux Desktops. Deepin Linux's default document reader "d…☆16Dec 22, 2023Updated 2 years ago
- Bundle of security analysis scripts for keras tensorflow models☆16Apr 15, 2024Updated 2 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆25Aug 21, 2023Updated 2 years ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆32Mar 8, 2025Updated last year
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- Putting the C2 in C2loudflare☆18Jun 28, 2024Updated last year
- Copy cat model for Proofpoint☆92Apr 30, 2020Updated 6 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆52Oct 6, 2020Updated 5 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Adversary Simulators High-Fidelity Intelligence and Reporting Toolkit☆170May 9, 2026Updated last week
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Jan 12, 2024Updated 2 years ago
- A red teaming attack paradigm against AI Agents☆33Mar 9, 2025Updated last year
- AI/ML applications have unique security threats. Project GuardRail is a set of security and privacy requirements that AI/ML applications …☆31Aug 28, 2025Updated 8 months ago
- Machine learning enabled dropper☆28May 1, 2023Updated 3 years ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆120Aug 7, 2023Updated 2 years ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Jul 9, 2023Updated 2 years ago
- Exploit, Malware and Vulnerability Scoring Application☆15Oct 5, 2023Updated 2 years ago
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆102Sep 5, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Windows Privesc Check☆20May 20, 2014Updated 12 years ago
- LobotoMl is a set of scripts and tools to assess production deployments of ML services☆10May 16, 2022Updated 4 years ago
- Local & remote Windows DLL Proxying☆174Jun 17, 2024Updated last year
- The repository accompanying the Buer Emulation workshop☆24Aug 18, 2021Updated 4 years ago
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆134Apr 23, 2026Updated 3 weeks ago
- A collection of sample code used in some experiments with Sliver C2☆17Mar 28, 2023Updated 3 years ago
- gRPC / gRPC-Web Pentest Practicing Lab☆10Aug 29, 2023Updated 2 years ago
- The OWASP Top 5 Machine Learning Risks[edit | edit source] The idea is to build the required resources which help software security comm…☆30Jun 9, 2018Updated 7 years ago
- Some vulnerability research slides that I made☆12Jan 5, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- RCE PoC for Empire C2 framework <5.9.3☆28Feb 24, 2024Updated 2 years ago
- A research project to add some brrrrrr to Burp☆210Feb 16, 2026Updated 3 months ago
- Common Exercise Format - CEXF☆11Aug 15, 2024Updated last year
- [Tensorflow] A Game Theoretic approach using GAN for Phishing URL synthesis and detection☆11Nov 14, 2022Updated 3 years ago
- ☆23Jun 1, 2023Updated 2 years ago
- Threat models, verification standards, and security controls for AI agent architectures. Built on OWASP AISVS and NIST AI RMF.☆21Feb 17, 2026Updated 3 months ago
- ATLAS tactics, techniques, and case studies data☆137May 6, 2026Updated 2 weeks ago