xforcered / MLOKitLinks
MLOps Attack Toolkit
☆19Updated last week
Alternatives and similar repositories for MLOKit
Users that are interested in MLOKit are comparing it to the libraries listed below
Sorting:
- Linux CS bypass technique☆33Updated 5 months ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆18Updated 5 months ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Updated last year
- Leverages B64 chunks to split files and save to clipboard☆26Updated 2 months ago
- Tools for offensive security of NetBackup infrastructures☆41Updated 2 years ago
- Nemesis agent for Mythic☆27Updated 10 months ago
- Proof-of-concept modular implant platform leveraging v8☆53Updated 4 months ago
- Repo hacks☆20Updated 2 months ago
- ☆17Updated 6 months ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 11 months ago
- A simple POC to expose Mythic as a MCP server☆65Updated 3 months ago
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆39Updated 8 months ago
- A robust command-line tool built in Rust that makes merging and deduplicating text files a breeze. Whether you're dealing with small file…☆19Updated 8 months ago
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆61Updated 7 months ago
- A Nemesis powered Retrieval-Augmented Generation (RAG) chatbot proof-of-concept.☆62Updated last year
- ☆14Updated last year
- AI-based implant feature☆24Updated 2 months ago
- Slides and videos from talks given at cons☆22Updated 3 weeks ago
- Your Skyfall Infrastructure Pack☆76Updated last month
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated last year
- A user enumeration tool for Slack.☆29Updated last year
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15Updated last year
- ☆26Updated 4 months ago
- Entra ID Password Protection Banned Password Lists☆16Updated last year
- Recreation of most of the Raccoon Infostealer's functionality, true to threat intelligence, for safe testing in organizational environmen…☆19Updated last year
- ☆32Updated last month
- Mythic C2 wrapper for NimSyscallPacker☆25Updated 4 months ago
- Bloodhound agent for Mythic☆21Updated 2 months ago
- ☆27Updated 2 weeks ago
- single-threaded event driven sleep obfuscation poc for linux☆34Updated last month