☆34Oct 24, 2025Updated 4 months ago
Alternatives and similar repositories for AIMaL
Users that are interested in AIMaL are comparing it to the libraries listed below
Sorting:
- A FAFO project: Command execution and data exfiltration of any kind through live streaming platforms☆25Feb 22, 2026Updated 3 weeks ago
- Model Context Protocol (MCP) server that provides access to Azure Resource Graph queries. It allows you to retrieve information about Azu…☆17May 6, 2025Updated 10 months ago
- Coalfire GCP RAMP/pak Reference Architecture☆13Feb 5, 2026Updated last month
- ☆49Nov 25, 2025Updated 3 months ago
- ☆49Nov 21, 2024Updated last year
- 🔍 erroreyes – Lightweight Subdomain Enumeration Tool A Python-based tool that queries crt.sh certificate logs to discover subdomains ass…☆16May 8, 2025Updated 10 months ago
- Cross Compatible Command and Control☆47Dec 18, 2025Updated 3 months ago
- UFSIT scripts and tools for hardening and auditing☆14May 28, 2025Updated 9 months ago
- Download your liked TikTok videos.☆18Dec 29, 2021Updated 4 years ago
- ☆13Aug 1, 2023Updated 2 years ago
- ☆37Jun 27, 2020Updated 5 years ago
- An automation framework for CyberSecurity Tools☆12Dec 6, 2025Updated 3 months ago
- ☆64Updated this week
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- Backup your TikTok videos. Download your favorite and posted videos or any public profile videos.☆24Jul 5, 2025Updated 8 months ago
- An agent that performs user actions on a workstation☆13Jan 22, 2018Updated 8 years ago
- Windows Trollware and Persistence Script☆13Sep 16, 2015Updated 10 years ago
- Spotter is a comprehensive Kubernetes security scanner that uses CEL-based rules to identify security vulnerabilities, misconfigurations,…☆73Sep 13, 2025Updated 6 months ago
- A work-in-progress image cropper.☆27Mar 8, 2018Updated 8 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆10Feb 17, 2025Updated last year
- ✌ ✌🏻 ✌🏼 ✌🏽 ✌🏾 ✌🏿☆13Jan 25, 2023Updated 3 years ago
- A simple utility to generate real File and Active Directory activity in lab environments for the purposes of monitoring changes and detec…☆11Dec 4, 2018Updated 7 years ago
- Windows Shell Link (LNK) Proof of Concept☆16Jul 19, 2025Updated 8 months ago
- GCP-Hound - Google Cloud Security Attack Path Discovery Tool - v1.1.2☆69Feb 17, 2026Updated last month
- A PowerShell script designed to detect misconfigured Azure Storage Accounts that could potentially be exploited for privilege escalation …☆13Apr 25, 2024Updated last year
- I want to say please and thank you to Claude, but I don't want to waste tokens on it.☆27Feb 18, 2026Updated last month
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 7 months ago
- Function ID for Malware Analysis☆13Jul 6, 2020Updated 5 years ago
- Fork of ReactOS (Cmd.exe), IRTriage Command Line Interpreter☆19Jun 4, 2018Updated 7 years ago
- Lightweight macOS detection agent built on Santa’s Endpoint Security telemetry.☆109Dec 3, 2025Updated 3 months ago
- ☆18Updated this week
- ☆18Feb 29, 2024Updated 2 years ago
- An Ansible Role that installs ADCS on Windows Server and optionally configures Certified Preowned templates.☆18Updated this week
- ☆16Mar 3, 2026Updated 2 weeks ago
- Public rules and samples for various automations through LimaCharlie.io☆14Dec 16, 2021Updated 4 years ago
- Interconnect Electronic Medical Records systems to each other and to other systems☆25Jan 25, 2017Updated 9 years ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆17Mar 1, 2022Updated 4 years ago
- This gem provides FFI based Ruby bindings for the zstd (Zstandard) compression library.☆18Mar 21, 2019Updated 6 years ago
- Opengraph-Compatible JSON Generator for BloodHound☆27Jan 12, 2026Updated 2 months ago