source code for the offsecml framework
☆45Jun 6, 2024Updated last year
Alternatives and similar repositories for offsecml
Users that are interested in offsecml are comparing it to the libraries listed below
Sorting:
- ☆18Jun 20, 2023Updated 2 years ago
- ☆13Jun 15, 2024Updated last year
- Scripts to automate standing up C2 infra with firewall settings inside of DigitalOcean.☆18Feb 5, 2021Updated 5 years ago
- [EMNLP 2024] Holistic Automated Red Teaming for Large Language Models through Top-Down Test Case Generation and Multi-turn Interaction☆17Nov 9, 2024Updated last year
- Intel Retrieval Augmented Generation (RAG) Utilities☆91Jan 29, 2024Updated 2 years ago
- ☆65Jan 17, 2026Updated 2 months ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆24Aug 21, 2023Updated 2 years ago
- CVE-2023-50254: PoC Exploit for Deepin-reader RCE that affects unpatched Deepin Linux Desktops. Deepin Linux's default document reader "d…☆16Dec 22, 2023Updated 2 years ago
- Bundle of security analysis scripts for keras tensorflow models☆16Apr 15, 2024Updated last year
- A sandbox environment designed for loading, running and profiling a wide range of files, including machine learning models, ELFs, Pickle,…☆353Mar 15, 2026Updated last week
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- Putting the C2 in C2loudflare☆18Jun 28, 2024Updated last year
- Lightweight LLM Interaction Framework☆407Updated this week
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆52Oct 6, 2020Updated 5 years ago
- Adversary Simulators High-Fidelity Intelligence and Reporting Toolkit☆169Updated this week
- A command line tool for extracting machine learning ready data from software binaries powered by Radare2☆73May 3, 2025Updated 10 months ago
- A red teaming attack paradigm against AI Agents☆32Mar 9, 2025Updated last year
- Machine learning enabled dropper☆28May 1, 2023Updated 2 years ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆117Aug 7, 2023Updated 2 years ago
- Data Scientists Go To Jupyter☆68Mar 3, 2025Updated last year
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Jul 9, 2023Updated 2 years ago
- Windows Privesc Check☆20May 20, 2014Updated 11 years ago
- LobotoMl is a set of scripts and tools to assess production deployments of ML services☆10May 16, 2022Updated 3 years ago
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆121Sep 2, 2025Updated 6 months ago
- A collection of sample code used in some experiments with Sliver C2☆16Mar 28, 2023Updated 2 years ago
- ATLAS tactics, techniques, and case studies data☆118Feb 6, 2026Updated last month
- The OWASP Top 5 Machine Learning Risks[edit | edit source] The idea is to build the required resources which help software security comm…☆30Jun 9, 2018Updated 7 years ago
- gRPC / gRPC-Web Pentest Practicing Lab☆10Aug 29, 2023Updated 2 years ago
- Some vulnerability research slides that I made☆12Jan 5, 2022Updated 4 years ago
- RCE PoC for Empire C2 framework <5.9.3☆28Feb 24, 2024Updated 2 years ago
- A research project to add some brrrrrr to Burp☆208Feb 16, 2026Updated last month
- [Tensorflow] A Game Theoretic approach using GAN for Phishing URL synthesis and detection☆11Nov 14, 2022Updated 3 years ago
- ☆23Jun 1, 2023Updated 2 years ago
- ☆24Apr 28, 2024Updated last year
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- OSED Practice binary☆25Nov 23, 2023Updated 2 years ago
- Structured CSVs and table schemas extracted from the 29-April-2025 LockBit affiliate-panel database leak.☆28May 8, 2025Updated 10 months ago
- Generative web directory fuzzer,crawling and subdomain checker based on chatgpt☆16May 15, 2024Updated last year