xforcered / MLOKitLinks
MLOps Attack Toolkit
☆27Updated 3 weeks ago
Alternatives and similar repositories for MLOKit
Users that are interested in MLOKit are comparing it to the libraries listed below
Sorting:
- Backend development stack for agents☆30Updated last month
- Linux CS bypass technique☆33Updated 7 months ago
- A robust command-line tool built in Rust that makes merging and deduplicating text files a breeze. Whether you're dealing with small file…☆19Updated 10 months ago
- A simple POC to expose Mythic as a MCP server☆67Updated 5 months ago
- Java archive implant toolkit.☆61Updated 4 months ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆22Updated 8 months ago
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆62Updated 2 weeks ago
- Webshell agent in aspx and php☆24Updated 3 months ago
- HTML Smuggling with Web Assembly☆64Updated last year
- A Nemesis powered Retrieval-Augmented Generation (RAG) chatbot proof-of-concept.☆68Updated last month
- Nemesis agent for Mythic☆27Updated last year
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆40Updated 10 months ago
- ☆26Updated 6 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆42Updated last year
- Leverages B64 chunks to split files and save to clipboard☆26Updated 4 months ago
- ☆35Updated 3 months ago
- Command and Control Framework using powershell implants☆35Updated 2 months ago
- Your Skyfall Infrastructure Pack☆76Updated 3 weeks ago
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆62Updated 9 months ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 3 years ago
- Artifact monitoring that ensures fairplay☆78Updated 7 months ago
- single-threaded event driven sleep obfuscation poc for linux☆35Updated 3 months ago
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆15Updated 5 years ago
- Docker container for running CobaltStrike 4.10☆37Updated 11 months ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- ☆16Updated 4 months ago
- Sh3ller is a lightweight C2 framework in its simplest form.☆23Updated last week
- Proof-of-concept modular implant platform leveraging v8☆55Updated 6 months ago
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆124Updated last year
- Mythic C2 wrapper for NimSyscallPacker☆25Updated 6 months ago