5stars217 / malicious_modelsLinks
using ML models for red teaming
☆44Updated 2 years ago
Alternatives and similar repositories for malicious_models
Users that are interested in malicious_models are comparing it to the libraries listed below
Sorting:
- An interactive CLI application for interacting with authenticated Jupyter instances.☆54Updated 3 months ago
- ☆116Updated 2 years ago
- ☆18Updated last year
- Data Scientists Go To Jupyter☆65Updated 5 months ago
- A curated list of argument injection vectors☆41Updated 7 months ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Updated 5 months ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆115Updated last year
- ☆59Updated 2 years ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆47Updated 11 months ago
- Tool to spray AWS Console IAM Logins☆30Updated 3 years ago
- ☆24Updated 2 years ago
- An Evil OIDC Server☆53Updated 2 years ago
- https://arxiv.org/abs/2412.02776☆59Updated 8 months ago
- ☆21Updated 3 months ago
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆78Updated 3 months ago
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆131Updated 8 months ago
- Blogpost series showcasing interesting cloud - web app security bugs☆49Updated 2 years ago
- Manager of third-party sources of Semgrep rules 🗂☆87Updated last year
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated last year
- ☆50Updated last year
- source code for the offsecml framework☆41Updated last year
- Verizon Burp Extensions: AI Suite☆137Updated 4 months ago
- ☆52Updated 2 weeks ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated last year
- Damn Vulnerable Browser Extension (DVBE), previously named as Badly Coded Browser Extension (BCBE), is an open-source vulnerable Chrome E…☆31Updated 5 months ago
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆33Updated 5 months ago
- Determine privileges from cloud credentials via brute-force testing.☆69Updated last year
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆40Updated 2 months ago
- Konstellation is a configuration-driven CLI tool to enumerate cloud resources and store the data into Neo4j.☆28Updated last month
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆42Updated last year