vysecurity / OffensiveLAMLinks
A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or BRC4.
☆25Updated last year
Alternatives and similar repositories for OffensiveLAM
Users that are interested in OffensiveLAM are comparing it to the libraries listed below
Sorting:
- Simple reverse ICMP shell☆14Updated last year
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆22Updated last year
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated last year
- ELF Beacon Object File (BOF) Template☆19Updated 6 months ago
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Updated 11 months ago
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆20Updated last year
- string encryption in Nim☆19Updated 11 months ago
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆14Updated last year
- Example of using Sleep to create better named pipes.☆41Updated last year
- ☆36Updated last year
- A small example of loading BOFs in Python with pure reflection☆19Updated 2 years ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- An In-memory Embedding of CPython☆28Updated 4 years ago
- ☆35Updated 4 months ago
- A simple rpc2socks alternative in pure Go.☆28Updated 10 months ago
- Python3 tool to perform password spraying using RDP☆17Updated last year
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- A simple Linux in-memory .so loader☆30Updated 2 years ago
- A library to parse, modify, and implement Malleable C2 profiles☆26Updated 6 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Updated last year
- Items related to the RedELK workshop given at security conferences☆29Updated last year
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆14Updated 2 years ago
- Smuggle a file to a user's browser☆20Updated 3 years ago
- Cobalt Strike notifications via NTFY.☆13Updated 8 months ago
- ☆11Updated 4 months ago
- BOF for C2 framework☆41Updated 6 months ago
- Simple and sane cryptographic wrapper library.☆27Updated 2 years ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Updated 3 months ago
- Playing with PE's and Building Structures by Hand☆22Updated 3 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago