byt3bl33d3r / Leek-LLMLinks
Use a LLM to create the ultimate Leek AI for Leek Wars! 🥬
☆17Updated last year
Alternatives and similar repositories for Leek-LLM
Users that are interested in Leek-LLM are comparing it to the libraries listed below
Sorting:
- Nemesis agent for Mythic☆28Updated 3 weeks ago
- Configurable, Community driven, HTTP C2 Profile☆27Updated 7 months ago
- Minimal workflows☆20Updated last year
- Simple reverse ICMP shell☆14Updated last year
- Microsoft365 Device Code Phishing Framework☆39Updated 4 years ago
- Mythic Scripting PyPi package - mythic☆27Updated 2 months ago
- A standalone tool for logging shell commands to GhostWriter automatically☆19Updated last year
- Templates for developing your own listeners and agents for AdaptixC2.☆42Updated last week
- Top hashpwn rules☆20Updated 3 weeks ago
- A Nemesis powered Retrieval-Augmented Generation (RAG) chatbot proof-of-concept.☆70Updated 5 months ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 3 years ago
- HTML Smuggling with Web Assembly☆65Updated last year
- Template repo for hooking 3rd party agents into Mythic while hosting them on external GitHub Repos☆51Updated last year
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated last year
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Updated 2 years ago
- Smuggle a file to a user's browser☆20Updated 3 years ago
- Ansible role that Installs Mythic☆18Updated last year
- A framework for OAuth 2.0 device code authentication grant flow phishing☆46Updated 2 years ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆30Updated 2 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Updated 3 years ago
- P2P Communications of Named Pipes☆12Updated 3 weeks ago
- Remote code execution in Power Platform connectors via JSON deserialization☆23Updated 2 years ago
- ☆15Updated 2 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆25Updated 3 years ago
- wsnet☆26Updated 3 months ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆35Updated 4 years ago
- Identify Azure AD resources that issue tokens without MFA enforcement using the ROPC grant flow.☆83Updated last month
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 3 years ago
- TypeScript/JavaScript client libraries for Sliver☆23Updated 2 years ago
- Cobalt Strike random C2 Profile generator☆16Updated last month