jaredfolkins / llm-ambidextrous-shell-synchronizerLinks
Enables an LLM to remotely & securely control a jumphost using synchronous or asynchronous GET requests.
☆13Updated 9 months ago
Alternatives and similar repositories for llm-ambidextrous-shell-synchronizer
Users that are interested in llm-ambidextrous-shell-synchronizer are comparing it to the libraries listed below
Sorting:
- DEFCON 31 slide deck and video link☆66Updated 7 months ago
- Automates the network enumeration process in a fire-and-forget manner, among many more powerful functions. Zero effort, zero error networ…☆64Updated last month
- Ludus range for the Constructing Defense Lab☆70Updated 2 months ago
- MSIX Building Made Easy for Defenders☆60Updated 4 months ago
- Rebuild of portspoof in GO with additional features.☆26Updated 2 months ago
- ☆53Updated last year
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆40Updated 3 months ago
- POC tool to abuse windows server failover clusters☆53Updated 5 months ago
- Claude MCP server to perform analysis on ROADrecon data☆48Updated 9 months ago
- fully async implementation of Dirkjan's ROADTools☆34Updated 9 months ago
- msuserstats is a comprehensive Powershell tool to manage accounts from Microsoft Entra ID and Active Directory. It supports: a unified vi…☆43Updated 10 months ago
- ☆42Updated 7 months ago
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆110Updated 4 months ago
- ☆33Updated last year
- results of scraping OneDrive from February 2022 - March 2025☆26Updated 8 months ago
- Generate a report with charts and statistics about cracked passwords in XLSX format☆36Updated last month
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆33Updated 2 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆31Updated last year
- Scripts that automate portions of pentests.☆56Updated last week
- tool for identifying guest relationships between companies☆103Updated last year
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆43Updated 11 months ago
- Baseline a Windows System against LOLBAS☆69Updated last year
- Protection against HTML smuggling attacks.☆100Updated 6 months ago
- Red Team Collaboration Infrastructure☆98Updated 8 months ago
- A Nemesis powered Retrieval-Augmented Generation (RAG) chatbot proof-of-concept.☆70Updated 5 months ago
- Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP☆84Updated 7 months ago
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆42Updated last year
- create a "simulated internet" cyber range environment☆19Updated 7 months ago
- ☆59Updated last month
- ☆41Updated last year