5stars217 / malicious_models
using ML models for red teaming
☆39Updated last year
Related projects ⓘ
Alternatives and complementary repositories for malicious_models
- An interactive CLI application for interacting with authenticated Jupyter instances.☆48Updated 8 months ago
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆43Updated this week
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆23Updated 2 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆35Updated 6 months ago
- Dont Gamble with Risk☆14Updated 8 months ago
- source code for the offsecml framework☆35Updated 5 months ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆22Updated 3 months ago
- ☆16Updated 2 years ago
- A Simple CVE-2022-39299 PoC exploit generator to bypass authentication in SAML SSO Integrations using vulnerable versions of passport-sam…☆17Updated last year
- ☆34Updated 8 months ago
- ☆16Updated last year
- Tree of Attacks (TAP) Jailbreaking Implementation☆95Updated 9 months ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 2 years ago
- A simple tool to create mermaid js markdown charts from CVE IDs and CVE keyword searches.☆42Updated last year
- ☆15Updated 9 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆29Updated 5 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆45Updated 2 months ago
- ☆58Updated last year
- Enumerate AWS permissions and resources.☆64Updated 2 years ago
- An Evil OIDC Server☆51Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆18Updated 4 months ago
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆30Updated last year
- ☆17Updated 2 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆16Updated last year
- Some vulnerability research slides that I made☆12Updated 2 years ago
- Determine privileges from cloud credentials via brute-force testing.☆64Updated 2 months ago
- Analysis of the Enterprise SAST/DAST product landscape☆33Updated 8 months ago
- Leverages B64 chunks to split files and save to clipboard☆24Updated 5 months ago
- Tool to spray AWS Console IAM Logins☆25Updated 2 years ago