AIM-Intelligence / Automated-Multi-Turn-Jailbreaks
☆15Updated last week
Related projects ⓘ
Alternatives and complementary repositories for Automated-Multi-Turn-Jailbreaks
- Remote code execution in Power Platform connectors via JSON deserialization☆19Updated last year
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆12Updated 2 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆21Updated 3 years ago
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆18Updated 4 years ago
- SSDP Service Discovery☆16Updated 5 years ago
- Golang Shlyuz Implant Implementation☆12Updated last year
- Tricard - Malware Sandbox Fingerprinting☆19Updated 11 months ago
- ☆12Updated 2 years ago
- Python C2 with JScript Implant☆14Updated 11 months ago
- Quantum Insert Backdoor POC☆10Updated 7 years ago
- ADD/SUB encoder for alphanumeric shellcode☆9Updated 5 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆15Updated last year
- Exactly what it sounds like, which is something rad☆20Updated 2 years ago
- A collection of sample code used in some experiments with Sliver C2☆13Updated last year
- A standalone tool for logging shell commands to GhostWriter automatically☆15Updated 2 months ago
- ☆14Updated last year
- A PowerShell script to prevent Sysmon from writing its events☆14Updated 4 years ago
- Use a LLM to create the ultimate Leek AI for Leek Wars! 🥬☆12Updated 6 months ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- Manticore's Public Threats Repository☆10Updated 4 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆19Updated 6 months ago
- ☆11Updated 3 years ago
- Phishing sites configured to work with Netlify form handling☆12Updated 5 years ago
- 3gsocks - a reverse connection socks5 based network pivot☆9Updated 3 years ago
- Minimal workflows☆14Updated 7 months ago
- Silent Cleanup UAC Bypass POC☆11Updated 4 years ago
- A tool to sync mythic events with ghostwriter oplog.☆12Updated 3 years ago
- Exploit PoC for CVE's and non CVE's alike☆22Updated 4 years ago