5stars217 / malicious_models
using ML models for red teaming
☆43Updated last year
Alternatives and similar repositories for malicious_models:
Users that are interested in malicious_models are comparing it to the libraries listed below
- An interactive CLI application for interacting with authenticated Jupyter instances.☆53Updated last year
- Data Scientists Go To Jupyter☆62Updated 3 weeks ago
- source code for the offsecml framework☆38Updated 9 months ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆39Updated 7 months ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆22Updated 3 weeks ago
- AI Powered Sensitive Information Detection☆18Updated last year
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆67Updated last month
- ☆58Updated last year
- LLM Testing Findings Templates☆70Updated last year
- Konstellation is a configuration-driven CLI tool to enumerate cloud resources and store the data into Neo4j.☆21Updated last year
- ☆17Updated last year
- Tree of Attacks (TAP) Jailbreaking Implementation☆105Updated last year
- Blogpost series showcasing interesting cloud - web app security bugs☆47Updated last year
- InfoSec OpenAI Examples☆19Updated last year
- Autonomous AI C2☆30Updated 8 months ago
- A web security research tool for DOM testing☆19Updated last week
- Tool to spray AWS Console IAM Logins☆29Updated 2 years ago
- AI fun☆24Updated last month
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆41Updated 11 months ago
- A security-first linter for code that shouldn't need linting☆16Updated last year
- A curated list of argument injection vectors☆40Updated 2 months ago
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆30Updated 3 weeks ago
- Interactive results explorer and annotation tool for Nosey Parker☆27Updated last month
- Manager of third-party sources of Semgrep rules 🗂☆81Updated 8 months ago
- ☆16Updated 11 months ago
- Determine privileges from cloud credentials via brute-force testing.☆67Updated 7 months ago
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆29Updated 2 months ago
- ☆16Updated 2 years ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆29Updated 6 months ago
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆91Updated 3 months ago