redr0nin / Agentic-Flow-Corruption-AttacksLinks
A red teaming attack paradigm against AI Agents
☆30Updated 2 months ago
Alternatives and similar repositories for Agentic-Flow-Corruption-Attacks
Users that are interested in Agentic-Flow-Corruption-Attacks are comparing it to the libraries listed below
Sorting:
- BOF to decrypt Signal Desktop chat logs☆65Updated 3 months ago
- ☆50Updated 7 months ago
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆39Updated 3 weeks ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆49Updated last month
- Sniffing files generator☆58Updated 3 months ago
- ☆49Updated this week
- ☆55Updated 3 months ago
- Utilizng an MCP Server to communicate with your C2☆64Updated 3 weeks ago
- Docker container for running CobaltStrike 4.10☆37Updated 8 months ago
- ☆55Updated 7 months ago
- ☆52Updated 5 months ago
- Enumerate Domain Users Without Authentication☆34Updated last month
- A python script that automates a C2 Profile build☆41Updated 2 months ago
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆76Updated 3 months ago
- A Rust PoC implementation of the Early Bird process hollowing technique, inspired by https://github.com/boku7/HOLLOW.☆29Updated 4 months ago
- ☆29Updated last year
- A truly Position Independent Code (PIC) NimPlant C2 beacon written in C, without reflective loading.☆59Updated 3 months ago
- ☆37Updated 3 months ago
- Extract registry and NTDS secrets from local or remote disk images☆43Updated 2 months ago
- DFSCoerce exe revisited version with custom authentication☆40Updated last year
- ☆96Updated 9 months ago
- malleable profile generator GUI for Havoc☆55Updated 2 years ago
- POC of GITHUB simple C2 in rust☆53Updated 4 months ago
- SAM Dumping in C#☆48Updated 4 months ago
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆50Updated 4 months ago
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated 10 months ago
- Tool to bypass LSA Protection (aka Protected Process Light)☆53Updated 5 months ago
- BOF for C2 framework☆41Updated 6 months ago
- TokenCert☆97Updated 6 months ago
- Tool to aid in dumping LSASS process remotely☆39Updated 10 months ago