nuryslyrt / AttackImaginatorLinks
LLM Supported Attack Scenario Creator from Code Review
☆13Updated 10 months ago
Alternatives and similar repositories for AttackImaginator
Users that are interested in AttackImaginator are comparing it to the libraries listed below
Sorting:
- LLMBUS AI red team tool 🚍☆73Updated last month
- 🛡️ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Go…☆77Updated last month
- Canary Detection☆187Updated 4 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆82Updated last year
- https://lolad-project.github.io/☆81Updated 8 months ago
- All the principles of the AI modular structure that generates malicious code fragments sold on the dark web☆69Updated last year
- Verizon Burp Extensions: AI Suite☆138Updated 4 months ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆45Updated 3 months ago
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆105Updated last year
- ☆104Updated 2 months ago
- ☆74Updated this week
- AI-Powered, Local Pythonic Coding Agent 🐞💻☆24Updated 6 months ago
- AI Red Teaming Range☆54Updated 6 months ago
- Multi-Lingual GenAI Red Teaming Tool☆29Updated last year
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆125Updated last year
- ☆71Updated last month
- ☆174Updated 2 years ago
- A tool to keep AWS pentests and red teams efficient, organized, and stealthy.☆96Updated last year
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Updated 6 months ago
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆77Updated 11 months ago
- ☆94Updated 2 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 3 years ago
- An experimental project exploring the use of Large Language Models (LLMs) to solve HackTheBox machines autonomously.☆71Updated this week
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆132Updated 7 months ago
- tool for identifying guest relationships between companies☆102Updated last year
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆104Updated 2 years ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆150Updated 9 months ago
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆61Updated 11 months ago
- MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It emp…☆75Updated 6 months ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆145Updated last month