Arcanum-Sec / arc_pi_taxonomyLinks
The Arcanum Prompt Injection Taxonomy
☆209Updated 2 weeks ago
Alternatives and similar repositories for arc_pi_taxonomy
Users that are interested in arc_pi_taxonomy are comparing it to the libraries listed below
Sorting:
- A Go-based utility that processes input through multiple AI models concurrently (OpenAI, Claude, and Gemini) and provides a summarized co…☆79Updated 2 months ago
- A collection of Turbo Intruder scripts.☆63Updated 6 months ago
- A research project to add some brrrrrr to Burp☆185Updated 6 months ago
- AI for Ethical Hacking - Workshop☆159Updated last week
- Payloads for AI Red Teaming and beyond☆253Updated last month
- ☆189Updated 4 months ago
- ☆105Updated last year
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆225Updated 8 months ago
- ☆316Updated 2 months ago
- ☆22Updated 4 months ago
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆123Updated this week
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆194Updated 11 months ago
- A LLM explicitly designed for getting hacked☆158Updated 2 years ago
- Find CVEs associated to Linux and public exploits on github☆119Updated 4 months ago
- A web based checklist driven note taking app following bug bounty and web app pentest methodology.☆41Updated 2 months ago
- Verizon Burp Extensions: AI Suite☆137Updated 4 months ago
- CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).☆133Updated 4 months ago
- A OWASP Based Checklist With 80+ Test Cases☆152Updated 2 years ago
- FrogPost: postMessage Security Testing Tool☆94Updated 3 months ago
- Abuse trust-boundaries to bypass firewalls and network controls☆369Updated last month
- Websec interview questions by tib3rius answered☆310Updated last year
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆128Updated 3 years ago
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆267Updated 2 months ago
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆126Updated 6 months ago
- Scripts to download every Wordpress plugin (updated in the last 2 years) and run Semgrep over the lot of it while storing output in a dat…☆77Updated 6 months ago
- A tool to scrape the AWS ranges looking for a keyword in SSL certificate data.☆237Updated last year
- This repo contains the code for my secure code review challenges☆156Updated last week
- ☆96Updated 3 months ago
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆250Updated 2 years ago
- ☆198Updated last year