Experiments with Google Gemini's Vision capabilities for LLM driven/aided web navigation and desktop manipulation
☆31Jan 22, 2025Updated last year
Alternatives and similar repositories for gemini-web-navigator
Users that are interested in gemini-web-navigator are comparing it to the libraries listed below
Sorting:
- ☆17Jan 9, 2025Updated last year
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆15Feb 29, 2024Updated 2 years ago
- ☆21Jan 8, 2026Updated 2 months ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Feb 20, 2026Updated 2 weeks ago
- Click Once + App Domain☆67Feb 23, 2026Updated 2 weeks ago
- Cobalt Strike Beacon Object File (BOF) that uses RegConnectRegistryA + RegOpenKeyExA API to dump registry hives on remote computer☆17Mar 4, 2023Updated 3 years ago
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated 11 months ago
- A simple BOF that disables some logging with NtSetInformationProcess☆13Oct 13, 2023Updated 2 years ago
- JXA script for Mythic that prints the TCC.db☆15Apr 18, 2021Updated 4 years ago
- ☆57Apr 19, 2023Updated 2 years ago
- ☆50Jun 4, 2025Updated 9 months ago
- ☆39Oct 12, 2022Updated 3 years ago
- A portable C# utility for enumerating local and remote windows sessions☆56Jan 1, 2026Updated 2 months ago
- ELF Beacon Object File (BOF) Template☆19Nov 18, 2024Updated last year
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- Generate potential email addresses from LinkedIn☆17Jun 18, 2021Updated 4 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- Golem automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM☆100Jun 20, 2025Updated 8 months ago
- Microsoft365 Device Code Phishing Framework☆39Sep 4, 2021Updated 4 years ago
- A collection of Terraform projects, Ansible playbooks, and roles designed to build a Red Team infrastructure.☆18Jan 3, 2026Updated 2 months ago
- An interactive TUI tool to create Brute Ratel C4 profiles based on BURP browsing data.☆31May 23, 2025Updated 9 months ago
- Python script to leverage MSFT_MTProcess WMI class☆39Sep 17, 2025Updated 5 months ago
- MDE/MDI Defender setup for Ludus☆38Updated this week
- Vectored Exception Handling Squared☆30Dec 27, 2025Updated 2 months ago
- What's the Red Team doing to my Linux Box? - BSides Vienna 2024☆17Nov 23, 2024Updated last year
- JXA script based on research by Jeff Johnson on leveraging TextEdit to remove quarantine attributes on files. Jeff's original research is…☆17Jan 31, 2021Updated 5 years ago
- Request device ticket/token using the device's MSA☆38Aug 25, 2025Updated 6 months ago
- ADSI based SA tool☆17Apr 9, 2022Updated 3 years ago
- Office 365 and Exchange Enumeration Version 2☆18Jan 30, 2024Updated 2 years ago
- ☆139Jan 16, 2025Updated last year
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆46Jul 29, 2024Updated last year
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆21Feb 8, 2024Updated 2 years ago
- Ansible roles to deploy RedELK☆23Feb 15, 2023Updated 3 years ago
- A simple Nim stager (w/ fiber execution)☆20Jan 31, 2022Updated 4 years ago
- BasicLDR: A Reflective DLL Loader☆14Jun 11, 2024Updated last year
- Living Under the Land on Linux ~ Bsides Belfast/Vienna 2025☆38Nov 22, 2025Updated 3 months ago
- AI-powered security code analyzer using local LLMs for semantic vulnerability detection. Unlike traditional SAST tools, FalconEYE reas…☆39Feb 9, 2026Updated last month
- Shared library loading application for Linux written in Go.☆16Aug 31, 2020Updated 5 years ago