roostercoopllc / metAIsploit-assistant
Study into generating POC / Exploits for the metasploit framework using LLMs
☆11Updated last year
Alternatives and similar repositories for metAIsploit-assistant:
Users that are interested in metAIsploit-assistant are comparing it to the libraries listed below
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆22Updated 2 years ago
- Command and Control Framework☆14Updated 9 months ago
- Collaborative malware exchange repository.☆33Updated last month
- Analyze Windows Systems for common and unique vulnerabilities☆9Updated 2 years ago
- Passive Reconnaissance Techniques Approach helps for penetration testing and bug bounty hunting by gathering information about a target s…☆12Updated last year
- A Botnet builder built on Elasticsearch and Kibana with the help of C++ and Python3☆22Updated 4 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- ☆23Updated 2 years ago
- A compilation of Aggressor/Sleep scripts for operational purposes that I've made.☆11Updated 3 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆15Updated 3 years ago
- Script to chain search parameters for MalwareBazaar☆9Updated 10 months ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆15Updated 4 years ago
- powershell tool for VM evasion☆43Updated 4 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆16Updated 3 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 9 months ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆20Updated 4 years ago
- ☆12Updated 2 years ago
- Simple C2 over the Trello API☆37Updated 2 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 2 years ago
- Sources Codes of many Office Malwares☆16Updated 2 years ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆12Updated last year
- Extension functionality for the NightHawk operator client☆26Updated last year
- Serving files with conditions, serverside keying and more.☆18Updated 2 years ago
- A malicious .cab creation tool for CVE-2021-40444☆12Updated 3 years ago
- Searching .evtx logs for remote connections☆24Updated last year
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 3 years ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆36Updated 4 months ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Updated 2 years ago
- ☆17Updated 4 years ago
- Recon-ng modules for basic OSINT.☆11Updated 2 years ago