AI-Voodoo / BugOutLinks
AI-Powered, Local Pythonic Coding Agent ππ»
β24Updated 7 months ago
Alternatives and similar repositories for BugOut
Users that are interested in BugOut are comparing it to the libraries listed below
Sorting:
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structureβ¦β46Updated 4 months ago
- A simple tool designed to create Atomic Red Team tests with ease.β46Updated 7 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so onβ83Updated last year
- A comprehensive GenAI protection system designed to protect against malicious prompts, injection attacks, and harmful content. System incβ¦β92Updated 2 weeks ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders undβ¦β125Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data wβ¦β54Updated 10 months ago
- A home for detection content developed by the delivr.to teamβ72Updated 2 months ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.β52Updated 2 years ago
- β33Updated last year
- A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.β28Updated 7 months ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.β43Updated 9 months ago
- A little tool to filter the stranger strings from a binary so you can analyze the good onesβ48Updated last month
- Examine Chrome extensions for security issuesβ85Updated 2 months ago
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeamβ27Updated last year
- Proximity is a MCP security scanner powered with NOVAβ53Updated last month
- VTC - Velociraptor Timeline Creatorβ18Updated last year
- β31Updated 2 years ago
- β59Updated this week
- Baseline a Windows System against LOLBASβ68Updated last year
- Living Off Security Toolsβ52Updated last year
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local filesβ127Updated last year
- β47Updated last week
- β74Updated this week
- β17Updated 6 months ago
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to theirβ¦β28Updated 11 months ago
- Tools and scripts to deploy and manage OpenRelik instancesβ15Updated 4 months ago
- create a "simulated internet" cyber range environmentβ18Updated 5 months ago
- π Vulnerability assessment and vulnerability intelligence tool searching for vulnerabilities and exploits using keywords across multipleβ¦β36Updated 9 months ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from themβ34Updated 4 months ago
- All the principles of the AI modular structure that generates malicious code fragments sold on the dark webβ68Updated last year