byt3bl33d3r / Leek-LLM
Use a LLM to create the ultimate Leek AI for Leek Wars! π₯¬
β13Updated 11 months ago
Alternatives and similar repositories for Leek-LLM:
Users that are interested in Leek-LLM are comparing it to the libraries listed below
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the inβ¦β19Updated 4 years ago
- Configurable, Community driven, HTTP C2 Profileβ17Updated last month
- PoC for detecting and evading ETW detection of .Net Assembly.Loadβ20Updated 4 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online maβ¦β13Updated 4 years ago
- Cisco CallManager User Enumerationβ15Updated 2 years ago
- Phishing sites configured to work with Netlify form handlingβ12Updated 5 years ago
- β12Updated 2 years ago
- A 'trainer' agent which is great for showing customers a nice fake 'ransom' screen. Requires target machine to have head - since support β¦β11Updated last year
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individualβ14Updated 2 years ago
- Kibana app for RedELKβ17Updated 2 years ago
- A tool to sync mythic events with ghostwriter oplog.β13Updated 5 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.β10Updated last year
- Monitor malware scanning services for your payloadsβ10Updated 3 years ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.β21Updated 9 months ago
- β18Updated last year
- List accounts with Service Principal Names (SPN) not linked to active dns records in an Active Directory Domain.β18Updated 2 months ago
- Nemesis agent for Mythicβ27Updated 7 months ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing supportβ22Updated 3 years ago
- β16Updated 7 months ago
- Slides from my talk at the Adversary Village, Defcon 30β29Updated 2 years ago
- β13Updated 3 months ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+β17Updated 2 months ago
- Build a phishing server (Gophish) together with SMTP-redirector (Postfix) automatically in Digital Ocean with terraform and ansible..β20Updated 3 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerSβ¦β14Updated 3 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research teaβ¦β18Updated 3 years ago
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COMβ20Updated 10 months ago
- Remote code execution in Power Platform connectors via JSON deserializationβ21Updated 2 years ago
- β12Updated 4 years ago
- Test Azure environment for MFA misconfigurationsβ11Updated 2 years ago
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers fβ¦β19Updated 4 years ago