xforcered / MLOKitLinks
MLOps Attack Toolkit
☆27Updated last month
Alternatives and similar repositories for MLOKit
Users that are interested in MLOKit are comparing it to the libraries listed below
Sorting:
- Backend development stack for agents☆30Updated 2 months ago
- Linux CS bypass technique☆33Updated 8 months ago
- Proof-of-concept modular implant platform leveraging v8☆56Updated 7 months ago
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆40Updated 11 months ago
- Claude MCP server to perform analysis on ROADrecon data☆45Updated 6 months ago
- Sh3ller is a lightweight C2 framework in its simplest form.☆32Updated last month
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Updated last year
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆69Updated last month
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆42Updated last year
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆62Updated 10 months ago
- A simple POC to expose Mythic as a MCP server☆69Updated 6 months ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆22Updated last year
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆87Updated 2 months ago
- Leverages B64 chunks to split files and save to clipboard☆26Updated 5 months ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆23Updated 9 months ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆61Updated 11 months ago
- SVG Analysis and generation tools for commonly seen SVG attachment phishing☆41Updated last week
- Proximity is a MCP security scanner powered with NOVA☆39Updated last week
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆93Updated last month
- A robust command-line tool built in Rust that makes merging and deduplicating text files a breeze. Whether you're dealing with small file…☆19Updated 3 weeks ago
- Tools for offensive security of NetBackup infrastructures☆41Updated 2 years ago
- Your Skyfall Infrastructure Pack☆76Updated last month
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆16Updated last year
- A curated collection of Living off the Land (LotL) attack demonstrations where trusted binaries go rogue, because if it didn’t launch cal…☆34Updated last month
- AI-based implant feature☆25Updated 5 months ago
- A service container for interacting with SRA's VECTR☆12Updated 5 months ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- Nemesis agent for Mythic☆27Updated last year
- Command and Control Framework using powershell implants☆35Updated 3 months ago
- A Nemesis powered Retrieval-Augmented Generation (RAG) chatbot proof-of-concept.☆68Updated 2 months ago