MLOps Attack Toolkit
☆30Aug 25, 2025Updated 6 months ago
Alternatives and similar repositories for MLOKit
Users that are interested in MLOKit are comparing it to the libraries listed below
Sorting:
- One-header configurable C++20 COFF loader☆21Jul 21, 2025Updated 7 months ago
- A web security research tool for DOM testing☆24Feb 7, 2026Updated 3 weeks ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- A CLI tool (and library) written in Go to simplify the process of retrieving IP addresses from infrastructure hosted on Google Cloud Plat…☆11Nov 20, 2025Updated 3 months ago
- ☆58Feb 19, 2026Updated last week
- A service container for interacting with SRA's VECTR☆16Apr 9, 2025Updated 10 months ago
- Files for http://blog.deniable.org/posts/windows-callbacks/☆12Jan 1, 2023Updated 3 years ago
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆17Jul 22, 2022Updated 3 years ago
- Dynamic Indirect Syscalls via JOP/ROP in Pure no_std, no_alloc, no dependency Rust☆43Aug 6, 2025Updated 6 months ago
- Dumping LSA secrets: a story about task decorrelation☆14Jul 9, 2024Updated last year
- Toolkit of Projects to attack and evade Event Trace for Windows☆26Aug 28, 2025Updated 6 months ago
- Command Augmentation support for BOFs and .NET assemblies across agents☆40Feb 17, 2026Updated last week
- ☆18Feb 2, 2026Updated 3 weeks ago
- A lexer and parser for Sleep☆20Feb 20, 2026Updated last week
- A C++/Asm template for PIC/EXE/DLL malware☆24Aug 12, 2025Updated 6 months ago
- AI-based implant feature☆25Apr 28, 2025Updated 10 months ago
- ☆17Sep 17, 2025Updated 5 months ago
- Rust crate to run commands as another user☆54Feb 12, 2026Updated 2 weeks ago
- A cheatsheet of commands used to pass the CARTP (Certified Azure Red Team Professional) exam.☆21May 4, 2023Updated 2 years ago
- Userland exec PoC to be used as attack vector technique☆96Oct 23, 2025Updated 4 months ago
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆61Feb 5, 2025Updated last year
- Data about all known supply-chain attacks through history☆63May 28, 2025Updated 9 months ago
- Command-line tool for discovering SaaS platforms a company uses via DNS enumeration☆37Jul 23, 2025Updated 7 months ago
- command control framework☆32Updated this week
- ☆25Jan 23, 2025Updated last year
- GenZ Shellcode Generator to execute commands with winExec API☆22Apr 27, 2025Updated 10 months ago
- Unix Process hollowing in rust☆22Dec 16, 2024Updated last year
- Convert Sigma rules to SIEM queries, directly in your browser.☆111Jan 24, 2026Updated last month
- ☆96Aug 3, 2025Updated 6 months ago
- Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability☆24Feb 5, 2025Updated last year
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆32Jan 27, 2025Updated last year
- A recon tool for GCP Service Account Keys that requires no permissions☆27Apr 14, 2025Updated 10 months ago
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆32Feb 16, 2026Updated last week
- A modern Rust implementation of the original Stardust project, providing a sophisticated 32/64-bit shellcode template that features posit…☆59Mar 17, 2025Updated 11 months ago
- SMB Audit Tool you were looking for☆24Jun 16, 2023Updated 2 years ago
- Java client library for integration with Freja eID☆12Feb 10, 2026Updated 2 weeks ago
- ☆28Dec 26, 2025Updated 2 months ago
- A comprehensive database of Model Context Protocol vulnerabilities, security research, and exploits☆34Feb 16, 2026Updated 2 weeks ago
- Learn MongoDB from absolute basics.☆54Jan 16, 2026Updated last month