byt3bl33d3r / Leek-LLMLinks
Use a LLM to create the ultimate Leek AI for Leek Wars! 🥬
☆17Updated last year
Alternatives and similar repositories for Leek-LLM
Users that are interested in Leek-LLM are comparing it to the libraries listed below
Sorting:
- Configurable, Community driven, HTTP C2 Profile☆27Updated 6 months ago
- A standalone tool for logging shell commands to GhostWriter automatically☆19Updated last year
- Nemesis agent for Mythic☆28Updated this week
- Top hashpwn rules☆20Updated this week
- Remote code execution in Power Platform connectors via JSON deserialization☆23Updated 2 years ago
- Minimal workflows☆20Updated last year
- Mythic Scripting PyPi package - mythic☆27Updated 2 months ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 3 years ago
- Templates for developing your own listeners and agents for AdaptixC2.☆39Updated 3 weeks ago
- Microsoft365 Device Code Phishing Framework☆39Updated 4 years ago
- Mythic Developer Series: Workshop Golang Agent☆26Updated 2 years ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆46Updated 2 years ago
- List accounts with Service Principal Names (SPN) not linked to active dns records in an Active Directory Domain.☆32Updated last week
- Simple reverse ICMP shell☆14Updated last year
- HTML Smuggling with Web Assembly☆64Updated last year
- A Nemesis powered Retrieval-Augmented Generation (RAG) chatbot proof-of-concept.☆69Updated 4 months ago
- Slack post-exploitation script for leaked bot tokens and "d" cookies☆16Updated last month
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Updated 2 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 3 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆35Updated 4 years ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆30Updated 2 years ago
- Caesar-Cipher based encryption☆31Updated 4 years ago
- Smuggle a file to a user's browser☆20Updated 3 years ago
- Ansible role that Installs Mythic☆18Updated last year
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Updated 3 years ago
- Identify Azure AD resources that issue tokens without MFA enforcement using the ROPC grant flow.☆82Updated last month
- P2P Communications of Named Pipes☆12Updated this week
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆21Updated 5 years ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆22Updated last year
- ☆15Updated 2 years ago