vysecurity / OffensiveLAMLinks
A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or BRC4.
☆25Updated last year
Alternatives and similar repositories for OffensiveLAM
Users that are interested in OffensiveLAM are comparing it to the libraries listed below
Sorting:
- Simple reverse ICMP shell☆14Updated last year
- single-threaded event driven sleep obfuscation poc for linux☆34Updated last month
- string encryption in Nim☆20Updated last year
- Unix Process hollowing in rust☆22Updated 6 months ago
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Updated last year
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆22Updated last year
- Items related to the RedELK workshop given at security conferences☆29Updated last year
- ☆26Updated 4 months ago
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆20Updated last year
- Example of using Sleep to create better named pipes.☆41Updated last year
- Collection of Rust repos useful for Red Teamers.☆33Updated 2 years ago
- Python3 tool to perform password spraying using RDP☆17Updated last year
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆14Updated last year
- A simple rpc2socks alternative in pure Go.☆28Updated last year
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated last year
- BOF for C2 framework☆41Updated 8 months ago
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆39Updated 8 months ago
- ELF Beacon Object File (BOF) Template☆19Updated 7 months ago
- ☆18Updated 6 months ago
- ☆13Updated 6 months ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- A small example of loading BOFs in Python with pure reflection☆19Updated 2 years ago
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆33Updated last week
- An In-memory Embedding of CPython☆29Updated 4 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆33Updated 2 years ago
- Brute Ratel LDAP filtering and sorting tool. Easily take BR log output and pull hostnames for ease of use with other red team tooling. Su…☆38Updated last year
- Just another Process Injection using Process Hollowing technique.☆17Updated last year
- Nemesis agent for Mythic☆27Updated 10 months ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆33Updated 2 years ago
- Golang Implementation of Hell's gate☆17Updated 2 years ago