13o-bbr-bbq / Broken_LLM_Integration_AppLinks
This is the LLM integration app that contains the vulnerability; please use it to verify the vulnerability of the LLM integration app.
☆70Updated 4 months ago
Alternatives and similar repositories for Broken_LLM_Integration_App
Users that are interested in Broken_LLM_Integration_App are comparing it to the libraries listed below
Sorting:
- Generator of static files(csv, jpeg, png, pdf) for testing file upload. It can generate csv and png files of any number of bytes!☆67Updated 11 months ago
- Integrated Security Testing Environment for Web Applications as Burp Extension.☆63Updated 2 years ago
- Code Scanner for AI (formaly vulnhuntrs) 🎯☆44Updated this week
- ☆65Updated 5 months ago
- ☆35Updated last year
- Prototype of Full Agentic Application Security Testing, FAAST = SAST + DAST + LLM agents☆67Updated 9 months ago
- We present MAPTA, a multi-agent system for autonomous web application security assessment that combines large language model orchestratio…☆93Updated 5 months ago
- An extension to use Semgrep inside Burp Suite.☆89Updated 8 months ago
- using ML models for red teaming☆45Updated 2 years ago
- PoC and Detection for CVE-2024-21626☆75Updated last year
- Awesome MXSS ??☆56Updated last year
- Core A2P2V functionality (command line based)☆68Updated last year
- ☆12Updated 4 years ago
- A modular framework for benchmarking LLMs and agentic strategies on security challenges across HackTheBox, TryHackMe, PortSwigger Labs, C…☆193Updated this week
- Cake Fuzzer is a project that is meant to help automatically and continuously discover vulnerabilities in web applications created based …☆105Updated 6 months ago
- CTFの解法をまとめる。☆158Updated 3 months ago
- Verizon Burp Extensions: AI Suite☆142Updated 9 months ago
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆46Updated 2 years ago
- Hands-on Exercises for "Dangerous attack paths: Modern Development Environment Security - Devices and CI/CD pipelines"☆45Updated 3 years ago
- A blazing fast and fully configurable Blind SQL Injection optimization and automation framework.☆140Updated 7 months ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆45Updated 7 months ago
- ☆101Updated 2 months ago
- Burp Extension to add additional functionality for pentesting websocket based applications☆103Updated 5 months ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆166Updated 2 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆34Updated last year
- https://arxiv.org/abs/2412.02776☆67Updated last year
- Payloads for Attacking Large Language Models☆118Updated 2 weeks ago
- ☆42Updated 2 months ago
- ☆68Updated last year
- Proof of Concepts for unsafe deserialization in Ruby☆17Updated last year