Use a LLM to create the ultimate Leek AI for Leek Wars! π₯¬
β16May 2, 2024Updated last year
Alternatives and similar repositories for Leek-LLM
Users that are interested in Leek-LLM are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple reverse ICMP shellβ14Apr 30, 2024Updated last year
- Exploit Proof-of-Concept code for XAMPP v3.3.0 β '.ini' Buffer Overflow (Unicode + SEH)β14Nov 1, 2023Updated 2 years ago
- Asynchronous NFSv3 client in pure Pythonβ29Jul 16, 2025Updated 8 months ago
- collection of beacon object file (Cobalt strike)β12Jan 21, 2023Updated 3 years ago
- Miscellaneous examples for use with Cobalt Strike Beaconβ10Nov 19, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean β’ AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.β15Feb 29, 2024Updated 2 years ago
- β16Mar 10, 2017Updated 9 years ago
- A BOF for enumerating version information for DLLs associated for a Beacon process.β16Nov 23, 2021Updated 4 years ago
- YARA for offensive, YARA can do that!?β11Jul 9, 2024Updated last year
- Remote code execution in Power Platform connectors via JSON deserializationβ23Mar 30, 2023Updated 3 years ago
- C2 frameworks for RTO, server and implants for stealth red-teaming mode.β13Sep 11, 2024Updated last year
- Network Execution Toolβ17Sep 23, 2024Updated last year
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheetsβ12Jun 21, 2021Updated 4 years ago
- BloodHound Attack Research Kit. BARK is an Attack Kit for Attack path Management.β13May 21, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean β’ AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Cobalt Strike Beacon Object File (BOF) that uses RegConnectRegistryA + RegOpenKeyExA API to dump registry hives on remote computerβ17Mar 4, 2023Updated 3 years ago
- A standalone tool for logging shell commands to GhostWriter automaticallyβ19Aug 24, 2024Updated last year
- π BotNet ( .NET ) Source Codesβ14May 2, 2024Updated last year
- A simple BOF (Beacon Object File) to search files in the systemβ15Dec 2, 2023Updated 2 years ago
- Playing with PE's and Building Structures by Handβ22Apr 21, 2022Updated 3 years ago
- βοΈ Red Team tools for capturing credentials & planting payloads using native Windows features.β12Jan 25, 2026Updated 2 months ago
- Prevent users from accessing online services. Distributed Denied of Service Attack server that cuts off targets or surrounding Infrastrucβ¦β10Jun 10, 2024Updated last year
- β11May 8, 2019Updated 6 years ago
- A security tool for detecting suspicious PDF modifications commonly found in BECβ41Aug 4, 2016Updated 9 years ago
- NordVPN Threat Protection Proβ’ β’ AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Parses logs created by Cobalt Strike, Brute Ratel, OC2 and creates an SQLite DB which can be used to create custom reports.β26Mar 18, 2026Updated last week
- Crawler malware through SMB share or LDAP queries, (require Administrator access for DCSync atttack).β13Jul 6, 2024Updated last year
- π± Ronin the Shogun, WebApp parameter analysis and fuzzer for XSS and SSRF.β14Sep 8, 2024Updated last year
- poc for CVE-2025-14847β24Dec 26, 2025Updated 3 months ago
- Playing with WPA frequency sessions framworks, check-lists of customs firmware and intensity of RF.β13Jul 7, 2024Updated last year
- A Python script to authenticate and test access to Google Cloud Platform (GCP) resources.β17Jan 31, 2024Updated 2 years ago
- Weaponizing Nim, with the elegance of modern logic programming language. Nim can do that!?β14Jun 24, 2024Updated last year
- rootkit and kernel pentesting for Linux, most advanced malware for SUID.β10Jul 18, 2024Updated last year
- The Open Source Computer Science Degree sc: Ossuβ14Apr 6, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean β’ AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- An app to monitor and view app usage statistics for your desktop.β16Mar 22, 2026Updated last week
- Encrypting directory and access. Execute the commands based on external inputs RCE, single-C2 and key-logging.β11Jul 9, 2024Updated last year
- Radio frequency cybersecurity architech research, based on latest severe damage to privacy or modify wireless devices.β16Sep 11, 2024Updated last year
- game of active directory (SnapLabs version)β16Aug 12, 2025Updated 7 months ago
- Automated exploit scanners for public CCTV's services and other polaroid public stuff.β25Sep 29, 2024Updated last year
- Safely wiping your secure data in Golangβ18Nov 15, 2021Updated 4 years ago
- β20Jan 18, 2024Updated 2 years ago