5stars217 / malicious_modelsLinks
using ML models for red teaming
☆44Updated 2 years ago
Alternatives and similar repositories for malicious_models
Users that are interested in malicious_models are comparing it to the libraries listed below
Sorting:
- An interactive CLI application for interacting with authenticated Jupyter instances.☆53Updated 3 months ago
- ☆116Updated 2 years ago
- An Evil OIDC Server☆53Updated 2 years ago
- ☆18Updated last year
- Create tar/zip archives that try to exploit zipslip vulnerability.☆47Updated 10 months ago
- ☆58Updated 2 years ago
- Blogpost series showcasing interesting cloud - web app security bugs☆49Updated 2 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- A curated list of argument injection vectors☆41Updated 6 months ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Updated 5 months ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆114Updated last year
- source code for the offsecml framework☆41Updated last year
- Enumerate AWS permissions and resources.☆70Updated 3 years ago
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆32Updated 5 months ago
- Determine privileges from cloud credentials via brute-force testing.☆69Updated 11 months ago
- Data Scientists Go To Jupyter☆65Updated 5 months ago
- Verizon Burp Extensions: AI Suite☆132Updated 3 months ago
- https://arxiv.org/abs/2412.02776☆59Updated 8 months ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated 11 months ago
- ☆24Updated 2 years ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆42Updated last year
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆30Updated 6 months ago
- ☆18Updated 3 years ago
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆75Updated 3 months ago
- Manager of third-party sources of Semgrep rules 🗂☆87Updated last year
- ☆50Updated last year
- ☆21Updated 2 months ago
- A simple tool to create mermaid js markdown charts from CVE IDs and CVE keyword searches.☆45Updated 2 years ago
- Additional active scan checks for BURP☆28Updated 10 months ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Updated last year