5stars217 / malicious_models
using ML models for red teaming
☆43Updated last year
Alternatives and similar repositories for malicious_models
Users that are interested in malicious_models are comparing it to the libraries listed below
Sorting:
- Data Scientists Go To Jupyter☆63Updated 2 months ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆53Updated last week
- AI Powered Sensitive Information Detection☆18Updated last year
- source code for the offsecml framework☆40Updated 11 months ago
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆34Updated last year
- A web security research tool for DOM testing☆21Updated this week
- Manage attack surface data on Elasticsearch☆22Updated last year
- ☆17Updated last year
- Blogpost series showcasing interesting cloud - web app security bugs☆47Updated last year
- ☆17Updated 2 years ago
- ☆17Updated 3 years ago
- Determine privileges from cloud credentials via brute-force testing.☆67Updated 8 months ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆41Updated 8 months ago
- ☆35Updated 9 months ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆108Updated last year
- ☆16Updated last year
- Demo of various ways to exploit post based reflected XSS☆18Updated last year
- ☆34Updated last month
- https://arxiv.org/abs/2412.02776☆54Updated 5 months ago
- A curated list of argument injection vectors☆41Updated 3 months ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- A simple tool to create mermaid js markdown charts from CVE IDs and CVE keyword searches.☆43Updated 2 years ago
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆32Updated 2 months ago
- Konstellation is a configuration-driven CLI tool to enumerate cloud resources and store the data into Neo4j.☆21Updated last year
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆33Updated last month
- An extension to use Semgrep inside Burp Suite.☆89Updated last year
- InfoSec OpenAI Examples☆19Updated last year
- ☆13Updated last year
- ☆44Updated 3 years ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Updated 2 months ago