13o-bbr-bbq / Broken_LLM_Integration_AppLinks
This is the LLM integration app that contains the vulnerability; please use it to verify the vulnerability of the LLM integration app.
☆56Updated 2 weeks ago
Alternatives and similar repositories for Broken_LLM_Integration_App
Users that are interested in Broken_LLM_Integration_App are comparing it to the libraries listed below
Sorting:
- Integrated Security Testing Environment for Web Applications as Burp Extension.☆63Updated 2 years ago
- Generator of static files(csv, jpeg, png, pdf) for testing file upload. It can generate csv and png files of any number of bytes!☆68Updated 5 months ago
- XBOW Validation Benchmarks☆168Updated last month
- PoC and Detection for CVE-2024-21626☆75Updated last year
- MCP Server for Burp☆211Updated 3 weeks ago
- ☆11Updated 3 years ago
- Core A2P2V functionality (command line based)☆68Updated last year
- TypeScript Scenario-Based Web Application Fuzzing Framework☆65Updated 3 years ago
- BurpSuite MCP Server: A powerful Model Context Protocol (MCP) server implementation for BurpSuite, providing programmatic access to Burp…☆45Updated 2 months ago
- ☆9Updated last year
- A simple mutator engine which focuses on finding unknown classes of injection vulnerabilities☆67Updated last year
- AutoSpear☆62Updated last year
- ☆48Updated 9 months ago
- Proof of Concepts for unsafe deserialization in Ruby☆17Updated 9 months ago
- Cake Fuzzer is a project that is meant to help automatically and continuously discover vulnerabilities in web applications created based …☆99Updated last week
- Hands-on Exercises for "Dangerous attack paths: Modern Development Environment Security - Devices and CI/CD pipelines"☆45Updated 2 years ago
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆45Updated last year
- Payloads for Attacking Large Language Models☆91Updated last month
- ☆33Updated last year
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆41Updated 7 months ago
- using ML models for red teaming☆43Updated last year
- ☆62Updated last year
- A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSON☆113Updated last year
- An extension to use Semgrep inside Burp Suite.☆89Updated last month
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆122Updated 6 months ago
- A blazing fast and fully configurable Blind SQL Injection optimization and automation framework.☆138Updated last month
- ☆35Updated 4 years ago
- ☆42Updated 2 years ago
- 2022 CTF public release☆23Updated 3 years ago
- ☆61Updated 2 months ago