GhostPack / RAGnarok
A Nemesis powered Retrieval-Augmented Generation (RAG) chatbot proof-of-concept.
☆59Updated 11 months ago
Alternatives and similar repositories for RAGnarok:
Users that are interested in RAGnarok are comparing it to the libraries listed below
- An Ansible collection that installs an ADFS deployment with optional configurations.☆27Updated 2 months ago
- ☆48Updated 3 months ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆51Updated 9 months ago
- Living Off the Foreign Land setup scripts☆64Updated last month
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆76Updated 5 months ago
- Living off the land searches for explorer and sharepoint☆56Updated 3 months ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆74Updated 8 months ago
- Nemesis agent for Mythic☆26Updated 5 months ago
- Utilities for obfuscating shellcode☆51Updated 7 months ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆33Updated last month
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆87Updated last year
- Leveraging AWS Lambda Function URLs for C2 Redirection☆26Updated last year
- A Python POC for CRED1 over SOCKS5☆139Updated 4 months ago
- Microsoft Graph API post-exploitation toolkit☆93Updated 7 months ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆54Updated 2 years ago
- ☆71Updated last year
- ☆64Updated 11 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆88Updated 8 months ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- Python module for running BOFs☆68Updated last year
- SMB Audit Tool you were looking for☆19Updated last year
- Microsoft365 Device Code Phishing Framework☆36Updated 3 years ago
- A small script that automates Entra ID persistence with Windows Hello For Business key☆53Updated this week
- My BloodHound custom queries☆23Updated 2 years ago
- Bloodhound agent for Mythic☆16Updated 5 months ago
- Convert an LDIF file to JSON files ingestible by BloodHound☆41Updated 5 months ago
- Deploy a phishing infrastructure on the fly.☆68Updated 2 months ago