moohax / malwareGPTLinks
☆15Updated 2 years ago
Alternatives and similar repositories for malwareGPT
Users that are interested in malwareGPT are comparing it to the libraries listed below
Sorting:
- ☆25Updated 3 years ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Updated 2 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆18Updated 3 months ago
- ☆31Updated this week
- Nemesis agent for Mythic☆27Updated 9 months ago
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- Ansible role that Installs Mythic☆15Updated 11 months ago
- ☆14Updated last year
- Generate droppers with encrypted payloads automatically.☆54Updated 3 years ago
- A Couple of Python Scripts Leveraging MS365's GraphAPI to Send Custom Calendar Events / Emails from Cheap O365 Accounts☆18Updated last year
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated last year
- Scripts to interact with Microsoft Graph APIs☆40Updated 6 months ago
- Find Inbound Email Domains☆24Updated last year
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- ☆28Updated this week
- Quick Start/Setup of CI/CD for Offensive/Defensive Purposes☆19Updated 3 years ago
- ☆32Updated 5 years ago
- A Nemesis powered Retrieval-Augmented Generation (RAG) chatbot proof-of-concept.☆60Updated last year
- ☆23Updated 3 years ago
- Machine learning enabled dropper☆27Updated 2 years ago
- The repository that complements the From zero to hero: creating a reflective loader in C# workshop☆38Updated 3 years ago
- Payload Generation Framework☆9Updated 5 years ago
- Docker container for running CobaltStrike 4.7 and above☆19Updated 2 months ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆30Updated 3 years ago
- Some of my custom "tools".☆23Updated 3 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆57Updated 2 years ago
- Smuggle a file to a user's browser☆20Updated 3 years ago
- ☆38Updated last year
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago
- Microsoft365 Device Code Phishing Framework☆37Updated 3 years ago