5stars217 / offsecmlLinks
source code for the offsecml framework
☆44Updated last year
Alternatives and similar repositories for offsecml
Users that are interested in offsecml are comparing it to the libraries listed below
Sorting:
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆84Updated 9 months ago
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆92Updated this week
- Data Scientists Go To Jupyter☆68Updated 11 months ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆117Updated 2 years ago
- ☆83Updated last week
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆157Updated last year
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55Updated 9 months ago
- ☆18Updated last year
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆61Updated 2 months ago
- AI-Powered, Local Pythonic Coding Agent 🐞💻☆24Updated 11 months ago
- Verizon Burp Extensions: AI Suite☆142Updated 9 months ago
- ☆92Updated this week
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆115Updated 5 months ago
- ☆139Updated last week
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆41Updated 4 months ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆49Updated 7 months ago
- Living Off Security Tools☆58Updated 2 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated last year
- ☆44Updated last year
- using ML models for red teaming☆45Updated 2 years ago
- Example agents for the Dreadnode platform☆22Updated last month
- Examine Chrome extensions for security issues☆93Updated 2 months ago
- A tool to help pentesters quickly identify privileged principals and second-order privilege escalation opportunities in unfamiliar AWS ac…☆142Updated 2 months ago
- Canary Detection☆188Updated 3 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Updated 10 months ago
- Assortment of scripts and tools for our Blackhat EU 2024 talk☆104Updated last year
- ☆42Updated 2 months ago
- Hijack a slack bot to phish your way in☆57Updated 6 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆83Updated last year
- Reference notes for Attacking and Defending Generative AI presentation☆69Updated last year