AI-Voodoo / BugOut
AI-Powered, Local Pythonic Coding Agent ππ»
β23Updated last month
Alternatives and similar repositories for BugOut:
Users that are interested in BugOut are comparing it to the libraries listed below
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.β34Updated last month
- Providing Azure pipelines to create an infrastructure and run Atomic tests.β50Updated last year
- A simple tool designed to create Atomic Red Team tests with ease.β37Updated 2 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so onβ81Updated 10 months ago
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Responsβ¦β51Updated 4 months ago
- Living Off Security Toolsβ45Updated 4 months ago
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to theirβ¦β24Updated 3 months ago
- A Nemesis powered Retrieval-Augmented Generation (RAG) chatbot proof-of-concept.β59Updated 11 months ago
- β32Updated last year
- β34Updated last year
- Baseline a Windows System against LOLBASβ25Updated 10 months ago
- β24Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data wβ¦β51Updated 2 months ago
- β20Updated last year
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europeβ33Updated 8 months ago
- A robust command-line tool built in Rust that makes merging and deduplicating text files a breeze. Whether you're dealing with small fileβ¦β18Updated 4 months ago
- β76Updated 10 months ago
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeamβ25Updated 7 months ago
- β80Updated 3 months ago
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.β34Updated last month
- Automation of Active Directory penetration testing tasks on top of BloodHound CEβ34Updated last year
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.β76Updated 6 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-factoβ¦β36Updated 10 months ago
- The ultimate solution for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.β22Updated 6 months ago
- a simple powershell wrapper to automate checking a user's access around the networkβ13Updated last year