roostercoopllc / metAIsploit-assistant
Study into generating POC / Exploits for the metasploit framework using LLMs
☆12Updated last year
Alternatives and similar repositories for metAIsploit-assistant
Users that are interested in metAIsploit-assistant are comparing it to the libraries listed below
Sorting:
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- AI modular structure that provides automation-based attack and penetration☆14Updated last year
- Extension functionality for the NightHawk operator client☆27Updated last year
- My nim learning experiments☆11Updated 2 years ago
- Personnel scripts,projects notes,hacks,random thoughts,mindmap etc....☆31Updated 3 months ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆12Updated 10 months ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- Recon-ng modules for basic OSINT.☆11Updated 3 years ago
- ☆18Updated 5 months ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 2 years ago
- ☆24Updated 2 years ago
- ☆18Updated 4 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Updated last year
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆41Updated 8 months ago
- Analyze Windows Systems for common and unique vulnerabilities☆9Updated 2 years ago
- Serving files with conditions, serverside keying and more.☆18Updated 2 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆15Updated 3 years ago
- ☆10Updated 6 months ago
- ☆15Updated 2 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- Searching .evtx logs for remote connections☆23Updated last year
- Script to chain search parameters for MalwareBazaar☆11Updated 3 months ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago
- Rust Weaponization for Red Team Engagements.☆11Updated 2 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 5 years ago
- ☆12Updated 2 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆24Updated 2 years ago
- ☆42Updated last month
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆21Updated last year