DarkSpaceSecurity / SpyAI
Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's using GPT-4 Vision to analyze them and construct daily activity — frame by frame
☆34Updated this week
Alternatives and similar repositories for SpyAI:
Users that are interested in SpyAI are comparing it to the libraries listed below
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆62Updated 3 weeks ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆77Updated 7 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆145Updated 10 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆163Updated 5 months ago
- Addon for BHCE☆40Updated 2 weeks ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆168Updated 3 weeks ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆85Updated 9 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆90Updated 9 months ago
- ☆58Updated 5 months ago
- Tool to extract username and password of current user from PanGPA in plaintext☆83Updated 3 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆102Updated last month
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆49Updated 2 weeks ago
- ☆37Updated 11 months ago
- A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders Stardust☆84Updated 11 months ago
- Advanced Email Threat Hunting w/ Detection as Code☆52Updated last month
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆114Updated this week
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆160Updated 3 months ago
- Situational Awareness script to identify how and where to run implants☆48Updated 3 months ago
- ☆22Updated last month
- Windows Administrator level Implant.☆49Updated 6 months ago
- BloodHound PowerShell client☆51Updated 2 weeks ago
- ☆103Updated 5 months ago
- Jasmin ransomware web panel path traversal PoC☆21Updated 11 months ago
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)☆64Updated 9 months ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆143Updated 9 months ago
- Invoke-ArgFuscator is an open-source, cross-platform PowerShell module that helps generate obfuscated command-lines for common system-nat…☆149Updated last month
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆141Updated 8 months ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆22Updated 4 months ago
- Construct the payload at runtime using an array of offsets☆63Updated 9 months ago
- A Mythic Agent written in PIC C.☆185Updated last month