source code for the offsecml framework
☆45Jun 6, 2024Updated last year
Alternatives and similar repositories for offsecml
Users that are interested in offsecml are comparing it to the libraries listed below
Sorting:
- [EMNLP 2024] Holistic Automated Red Teaming for Large Language Models through Top-Down Test Case Generation and Multi-turn Interaction☆17Nov 9, 2024Updated last year
- ☆16Jun 20, 2023Updated 2 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆24Aug 21, 2023Updated 2 years ago
- Intel Retrieval Augmented Generation (RAG) Utilities☆91Jan 29, 2024Updated 2 years ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆32Mar 8, 2025Updated 11 months ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- gRPC / gRPC-Web Pentest Practicing Lab☆10Aug 29, 2023Updated 2 years ago
- A sandbox environment designed for loading, running and profiling a wide range of files, including machine learning models, ELFs, Pickle,…☆349Updated this week
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- Some vulnerability research slides that I made☆12Jan 5, 2022Updated 4 years ago
- ☆13Jun 15, 2024Updated last year
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆52Oct 6, 2020Updated 5 years ago
- A red teaming attack paradigm against AI Agents☆32Mar 9, 2025Updated 11 months ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Jul 9, 2023Updated 2 years ago
- ☆14Sep 11, 2023Updated 2 years ago
- Bundle of security analysis scripts for keras tensorflow models☆16Apr 15, 2024Updated last year
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆99Sep 5, 2024Updated last year
- ☆14Jun 7, 2017Updated 8 years ago
- Windows Privesc Check☆20May 20, 2014Updated 11 years ago
- A BrainF*ck Inspired Shell Obfuscation Proof-of-Concept☆16Mar 11, 2024Updated last year
- Putting the C2 in C2loudflare☆18Jun 28, 2024Updated last year
- Exploit, Malware and Vulnerability Scoring Application☆15Oct 5, 2023Updated 2 years ago
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆121Sep 2, 2025Updated 5 months ago
- Windows Active DIrectory Pentesting documentation.☆19Jun 14, 2024Updated last year
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- Laz-y project compatible C# templates for shellcode injection.☆20May 1, 2022Updated 3 years ago
- Adversary Simulators High-Fidelity Intelligence and Reporting Toolkit☆169Updated this week
- CVE-2023-50254: PoC Exploit for Deepin-reader RCE that affects unpatched Deepin Linux Desktops. Deepin Linux's default document reader "d…☆16Dec 22, 2023Updated 2 years ago
- A command line tool for extracting machine learning ready data from software binaries powered by Radare2☆73May 3, 2025Updated 9 months ago
- Local & remote Windows DLL Proxying☆169Jun 17, 2024Updated last year
- Office 365 and Exchange Enumeration Version 2☆18Jan 30, 2024Updated 2 years ago
- Scripts to enumerate and report on Entra Conditional Access☆41Sep 5, 2025Updated 5 months ago
- Structured CSVs and table schemas extracted from the 29-April-2025 LockBit affiliate-panel database leak.☆28May 8, 2025Updated 9 months ago
- Simple netexec wraper with html repport☆19May 19, 2024Updated last year
- ☆26Feb 5, 2024Updated 2 years ago
- Lightweight LLM Interaction Framework☆407Updated this week
- ☆26Mar 6, 2025Updated 11 months ago
- ☆23Apr 28, 2024Updated last year