This is the LLM integration app that contains the vulnerability; please use it to verify the vulnerability of the LLM integration app.
☆74Oct 1, 2025Updated 5 months ago
Alternatives and similar repositories for Broken_LLM_Integration_App
Users that are interested in Broken_LLM_Integration_App are comparing it to the libraries listed below
Sorting:
- ☆74Nov 15, 2024Updated last year
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- disarmBot is a bot that uses the AG2 framework to automatically create multiple LLM Agents, discuss about disinformation, and respond to …☆20Nov 25, 2025Updated 3 months ago
- ☆11Dec 9, 2025Updated 2 months ago
- ☆11Feb 6, 2023Updated 3 years ago
- LLM Vulnerable Application☆13Aug 19, 2023Updated 2 years ago
- tricks I discovered while playing king of the hill☆17Jun 28, 2023Updated 2 years ago
- Archive of challenges @ Flatt Security Mini CTFs☆19Aug 20, 2025Updated 6 months ago
- Windows Event Log "Microsoft-Windows-Partition%4Diagnostic.evtx" parser and devices' VSNs extractor.☆20Nov 28, 2023Updated 2 years ago
- OSS sasanka repository☆24Feb 20, 2025Updated last year
- Legacy Sigma Tools (sigmac etc.)☆16May 7, 2023Updated 2 years ago
- An example of a mis-configured Rails application release under MIT license.☆21Jan 19, 2023Updated 3 years ago
- Nonce reuse attacks for AEAD ciphers, especially for the the most commonly used `ChaCha20-Poly1305` and `AES-GCM`.☆22Nov 7, 2024Updated last year
- ☆24Mar 4, 2025Updated last year
- IDA helper plugin to reverse engineer Objective-C code☆43Jun 12, 2025Updated 8 months ago
- 分析ツール結果シート☆19Nov 13, 2017Updated 8 years ago
- Python code to Serialize and Unserialize java binary serialization format.☆30Feb 27, 2026Updated last week
- Basic script to generate reverse shell payloads, generally most used in ctf.☆27Mar 20, 2024Updated last year
- Laravel PHP framework black-box vulnerability scanner☆37Sep 3, 2024Updated last year
- A vulnerable server to practice pen testing.☆96Sep 29, 2025Updated 5 months ago
- Integrated Security Testing Environment for Web Applications as Burp Extension.☆63Apr 16, 2023Updated 2 years ago
- ☆23Jun 30, 2021Updated 4 years ago
- A Sage implementation of the ROCA attack☆28May 16, 2023Updated 2 years ago
- CI-Friendly static linter with autofix, SAST, semantic analysis for GitHub Actions☆34Feb 28, 2026Updated last week
- A Modern Bug Bounty and Security Research Management Platform☆97Jun 12, 2025Updated 8 months ago
- ☆34Aug 28, 2024Updated last year
- Aggressor script to automatically download and load an arsenal of open source and private Cobalt Strike tooling.☆45Aug 16, 2024Updated last year
- Some crypto scripts which is useful in study and ctf☆29Sep 2, 2021Updated 4 years ago
- Jumpstart multiple WebSocket servers quickly☆32Nov 23, 2021Updated 4 years ago
- ☆32May 27, 2024Updated last year
- ☆31Aug 25, 2023Updated 2 years ago
- DFIR Timeline Analysis for macOS — SQLite-backed viewer for CSV, TSV, XLSX, EVTX, and Plaso files with built-in process inspection, later…☆136Updated this week
- Some simple scripts that I use during bug bounty hunting in Android Apps☆28Jan 30, 2025Updated last year
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆31Dec 26, 2023Updated 2 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆76Sep 2, 2022Updated 3 years ago
- ☆375Jun 25, 2025Updated 8 months ago
- ☆41Oct 20, 2023Updated 2 years ago
- IDAPython / IDC tips and tricks☆38Oct 25, 2022Updated 3 years ago
- Learn AI security through a series of vulnerable LLM CTF challenges. No sign ups, no cloud fees, run everything locally on your system.☆325Aug 22, 2024Updated last year