5stars217 / malicious_modelsLinks
using ML models for red teaming
☆43Updated last year
Alternatives and similar repositories for malicious_models
Users that are interested in malicious_models are comparing it to the libraries listed below
Sorting:
- source code for the offsecml framework☆40Updated last year
- Data Scientists Go To Jupyter☆64Updated 3 months ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆53Updated last month
- GCP cloud security CTF☆45Updated last month
- ☆17Updated last year
- AI Powered Sensitive Information Detection☆19Updated last year
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆32Updated 3 months ago
- ☆17Updated 2 years ago
- Invanti VPN Vulnerabilities for Jan - Feb 2024 - Links to Keep it all Organized☆16Updated last year
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆57Updated 7 months ago
- Blogpost series showcasing interesting cloud - web app security bugs☆49Updated last year
- ☆21Updated 2 years ago
- A simple tool to create mermaid js markdown charts from CVE IDs and CVE keyword searches.☆43Updated 2 years ago
- Tool to spray AWS Console IAM Logins☆29Updated 2 years ago
- Konstellation is a configuration-driven CLI tool to enumerate cloud resources and store the data into Neo4j.☆21Updated last year
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- Recreation of most of the Raccoon Infostealer's functionality, true to threat intelligence, for safe testing in organizational environmen…☆17Updated last year
- An Evil OIDC Server☆53Updated 2 years ago
- A collection of Semgrep rules which followed security guidelines for .NET and Java.☆23Updated 3 years ago
- ☆17Updated 3 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆18Updated 3 months ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆35Updated 2 months ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆41Updated 9 months ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆109Updated last year
- A curated list of argument injection vectors☆41Updated 4 months ago
- Some vulnerability research slides that I made☆12Updated 3 years ago
- Analysis of the Enterprise SAST/DAST product landscape☆37Updated last year
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆14Updated last year
- InfoSec OpenAI Examples☆19Updated last year
- ☆19Updated 2 weeks ago