0ca / BoxPwnrLinks
An experimental project exploring the use of Large Language Models (LLMs) to solve HackTheBox machines autonomously.
☆187Updated last week
Alternatives and similar repositories for BoxPwnr
Users that are interested in BoxPwnr are comparing it to the libraries listed below
Sorting:
- Verizon Burp Extensions: AI Suite☆141Updated 8 months ago
- ☆116Updated 2 years ago
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆83Updated 5 months ago
- ☆126Updated 2 weeks ago
- The most complete code auditing platform with thousands of real-world challenges☆134Updated 6 months ago
- A research project to add some brrrrrr to Burp☆196Updated 10 months ago
- Search engine for CTF writeups with instant results.☆152Updated 10 months ago
- ☆71Updated 3 weeks ago
- Automated vulnerability discovery and annotation☆67Updated last year
- ☆94Updated 3 weeks ago
- External Playbooks for Public Access☆40Updated 11 months ago
- LLM-based automated patch diffing☆89Updated 3 months ago
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆103Updated 4 months ago
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆82Updated 8 months ago
- ☆82Updated last month
- Prototype of Full Agentic Application Security Testing, FAAST = SAST + DAST + LLM agents☆67Updated 8 months ago
- ☆40Updated last month
- ☆223Updated 2 weeks ago
- A very simple open source implementation of Google's Project Naptime☆179Updated 9 months ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55Updated 8 months ago
- A modular tool to search for known vulnerabilities, exploits and more across various data sources☆74Updated last week
- Examine Chrome extensions for security issues☆90Updated last month
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆40Updated 3 months ago
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆110Updated 4 months ago
- AI / LLM Red Team Field Manual & Consultant’s Handbook☆219Updated this week
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆152Updated last year
- https://arxiv.org/abs/2412.02776☆67Updated last year
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Updated 9 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated last year
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆43Updated 6 months ago