This repository is for Red Teamers, security researchers, AI enthusiasts, and students to learn about adversarial attacks on AI/LLM systems. It is strictly for educational use, and the authors disclaim responsibility for any misuse.
☆20Sep 30, 2025Updated 5 months ago
Alternatives and similar repositories for AIGoat
Users that are interested in AIGoat are comparing it to the libraries listed below
Sorting:
- GDSC website☆14Apr 9, 2025Updated 10 months ago
- Repositorio encargado de almacenar los archivos del curso de Python de mi canal de Youtube☆12May 1, 2023Updated 2 years ago
- A repository for getting started on Capture The Flag competitions.☆15Dec 16, 2025Updated 2 months ago
- A collection of skills, agents, commands, and workflows for security researchers. Compatible with Claude Code, Claude Desktop, OpenCode, …☆29Feb 25, 2026Updated last week
- Applitools SDK for Taiko.js☆13Jan 4, 2023Updated 3 years ago
- ExecEvasion is a lightweight execution-evasion toolkit that generates command variants designed to bypass naive filters and WAF rules by …☆49Jan 31, 2026Updated last month
- Repository for tools used for the OSCP☆23Sep 18, 2025Updated 5 months ago
- A Security Operations playbook to assist blue teamers from day-to-day tasks to Digital Forensics and Incident Response (DFIR) activities.☆21Updated this week
- Hacking WordPress Plugins - Authenticated Shell Upload, by compromising admin console and upload a malicious plugin with PHP (reverse she…☆21Sep 22, 2024Updated last year
- Vulnerable Windows Application☆18Nov 27, 2023Updated 2 years ago
- Python library for AutoTrader Web broker independent automated trading API☆17Jul 16, 2022Updated 3 years ago
- ☆37Aug 6, 2025Updated 6 months ago
- Kerberos CNAME abuse PoC☆79Jan 27, 2026Updated last month
- Damn Vulnerable Browser Extension (DVBE), previously named as Badly Coded Browser Extension (BCBE), is an open-source vulnerable Chrome E…☆33Mar 4, 2025Updated last year
- this tool take a list of subdomains and give you the ip for each☆20Oct 9, 2020Updated 5 years ago
- ICSGoat: A Damn Vulnerable ICS Infrastructure☆32Aug 26, 2024Updated last year
- A penetration testing Swiss Army Knife that's suitable for CTF challenges, bug bounty hunting and red team assessments.☆31Feb 19, 2026Updated 2 weeks ago
- Code Commenter plugin for Acode app☆32Dec 10, 2025Updated 2 months ago
- A few basic dos, don'ts, and shoulds of secure application development☆24Jan 26, 2021Updated 5 years ago
- Massive collection of 772+ PowerShell scripts for Azure management. CI/CD with PSScriptAnalyzer, security scanning, and IaC validation. E…☆38Oct 3, 2025Updated 5 months ago
- Kali Linux Customization and Setup Tool for Newly Imported VM's☆36Feb 3, 2026Updated last month
- A complete free list of platforms and resources to learn anything to become anything.☆23Jan 17, 2023Updated 3 years ago
- DeepSeek Pentest AI - Burp Suite extension☆56Sep 14, 2025Updated 5 months ago
- Created by the one and only M.M.☆21Dec 1, 2024Updated last year
- ☆30Apr 2, 2022Updated 3 years ago
- Python script for automating the download of nessus reports☆27Aug 3, 2022Updated 3 years ago
- Framework for backtesting trading strategies in Python, based on the finta library.☆28Apr 4, 2020Updated 5 years ago
- ☆62Oct 3, 2025Updated 5 months ago
- Just another vulnerable web application.☆36Jul 27, 2024Updated last year
- Damn Vulnerable SCA Application☆42Feb 13, 2026Updated 2 weeks ago
- Have you ever wanted to search a link or IP address on multiple OSINT pages at once?☆59Jul 7, 2025Updated 7 months ago
- Interract with Microsoft SQL Server (MS SQL | MSSQL) servers and their linked instances in restricted environments, without the need for …☆54Feb 20, 2026Updated last week
- Penetration Testing/Security Cheatsheets☆34Oct 31, 2015Updated 10 years ago
- ☆40Aug 2, 2024Updated last year
- HTML parser for PEAS output with additional features☆123Feb 15, 2026Updated 2 weeks ago
- Flipper Zero Bad USB Repository and some extras for everyone to learn and use their flipper, and maybe create some scripts☆46Dec 10, 2024Updated last year
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆46Feb 2, 2023Updated 3 years ago
- This is a framework to test different ways of hardening a website. To avoid IP blocks, Tor is implemented (optional), and for invalid cer…☆135Feb 11, 2026Updated 3 weeks ago
- a C# implementation for a shellcode loader that capable to bypass Cortex XDR and Sophos EDR.☆92May 24, 2025Updated 9 months ago