5stars217 / malicious_models
using ML models for red teaming
☆43Updated last year
Alternatives and similar repositories for malicious_models:
Users that are interested in malicious_models are comparing it to the libraries listed below
- An interactive CLI application for interacting with authenticated Jupyter instances.☆53Updated last year
- Data Scientists Go To Jupyter☆62Updated last month
- A web security research tool for DOM testing☆20Updated this week
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆22Updated last month
- Tree of Attacks (TAP) Jailbreaking Implementation☆106Updated last year
- Blogpost series showcasing interesting cloud - web app security bugs☆47Updated last year
- source code for the offsecml framework☆38Updated 10 months ago
- Additional active scan checks for BURP☆27Updated 6 months ago
- ☆17Updated last year
- Verizon Burp Extensions: AI Suite☆127Updated this week
- A curated list of argument injection vectors☆40Updated 2 months ago
- Konstellation is a configuration-driven CLI tool to enumerate cloud resources and store the data into Neo4j.☆21Updated last year
- ☆57Updated last year
- AI Powered Sensitive Information Detection☆18Updated last year
- 2022 CTF public release☆23Updated 2 years ago
- Guided Differential Fuzzing for HTTP Request Parsing Discrepancies☆17Updated last year
- Determine privileges from cloud credentials via brute-force testing.☆67Updated 8 months ago
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆30Updated last month
- LLM Testing Findings Templates☆71Updated last year
- An extension to use Semgrep inside Burp Suite.☆88Updated last year
- ☆18Updated last week
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆41Updated 8 months ago
- A simple tool to create mermaid js markdown charts from CVE IDs and CVE keyword searches.☆43Updated 2 years ago
- Tool to spray AWS Console IAM Logins☆29Updated 2 years ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆31Updated 2 weeks ago
- Cryptovenom: The Cryptography Swiss Army Knife☆9Updated 5 years ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆41Updated last year
- ☆32Updated 2 years ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆13Updated 11 months ago
- ☆16Updated 2 years ago