redr0nin / Agentic-Flow-Corruption-Attacks
A red teaming attack paradigm against AI Agents
☆29Updated 2 months ago
Alternatives and similar repositories for Agentic-Flow-Corruption-Attacks
Users that are interested in Agentic-Flow-Corruption-Attacks are comparing it to the libraries listed below
Sorting:
- BOF to decrypt Signal Desktop chat logs☆65Updated 2 months ago
- ☆55Updated 6 months ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆47Updated last month
- ☆54Updated 3 months ago
- Tool to aid in dumping LSASS process remotely☆38Updated 9 months ago
- ☆50Updated 6 months ago
- POC of GITHUB simple C2 in rust☆53Updated 3 months ago
- malleable profile generator GUI for Havoc☆55Updated 2 years ago
- Simple C2 using GitHub repository as comms channel.☆31Updated 6 months ago
- Sniffing files generator☆56Updated 2 months ago
- Docker container for running CobaltStrike 4.10☆37Updated 7 months ago
- Impersonate Tokens using only NTAPI functions☆72Updated last month
- A simple POC to expose Mythic as a MCP server☆61Updated last month
- ☆106Updated 3 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆28Updated this week
- BOF for C2 framework☆41Updated 6 months ago
- A simple C++ Windows tool to get information about processes exposing named pipes.☆37Updated 2 months ago
- ☆24Updated 2 months ago
- Python tool to interact with WMI StdRegProv☆57Updated 5 months ago
- A python script that automates a C2 Profile build☆41Updated last month
- DFSCoerce exe revisited version with custom authentication☆40Updated last year
- Folder Or File Delete to Get System Shell on Current Session Desktop☆39Updated 4 months ago
- A BOF to enumerate system process, their protection levels, and more.☆116Updated 5 months ago
- ☆52Updated 4 months ago
- Situational Awareness script to identify how and where to run implants☆49Updated 5 months ago
- ☆28Updated 11 months ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Updated 2 months ago
- Extract registry and NTDS secrets from local or remote disk images☆40Updated 2 months ago
- Some of the presentations, workshops, and labs I gave at public conferences.☆33Updated last week
- ☆22Updated 2 months ago