5stars217 / malicious_models
using ML models for red teaming
☆42Updated last year
Alternatives and similar repositories for malicious_models:
Users that are interested in malicious_models are comparing it to the libraries listed below
- An interactive CLI application for interacting with authenticated Jupyter instances.☆50Updated 11 months ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆38Updated 6 months ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆26Updated 5 months ago
- ☆17Updated last year
- A National Vulnerability Database (NVD) API query tool☆18Updated last year
- source code for the offsecml framework☆37Updated 8 months ago
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆29Updated last month
- ☆58Updated last year
- AI Powered Sensitive Information Detection☆18Updated 11 months ago
- 2022 CTF public release☆24Updated 2 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- A Simple CVE-2022-39299 PoC exploit generator to bypass authentication in SAML SSO Integrations using vulnerable versions of passport-sam…☆18Updated 2 years ago
- ☆42Updated 8 months ago
- A web security research tool for DOM testing☆19Updated this week
- Blogpost series showcasing interesting cloud - web app security bugs☆47Updated last year
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- ☆17Updated 2 years ago
- ☆16Updated 2 years ago
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆60Updated 2 weeks ago
- Additional active scan checks for BURP☆26Updated 5 months ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆22Updated 2 months ago
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆31Updated last year
- A curated list of argument injection vectors☆40Updated last month
- InfoSec OpenAI Examples☆19Updated last year
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆40Updated last year
- My talks...☆22Updated this week
- Tool to spray AWS Console IAM Logins☆28Updated 2 years ago
- An Evil OIDC Server☆53Updated 2 years ago
- Manager of third-party sources of Semgrep rules 🗂☆78Updated 7 months ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆100Updated last year