Arcanum-Sec / arc_pi_taxonomy
The Arcanum Prompt Injection Taxonomy
☆56Updated last month
Alternatives and similar repositories for arc_pi_taxonomy:
Users that are interested in arc_pi_taxonomy are comparing it to the libraries listed below
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆71Updated 2 weeks ago
- ☆46Updated last month
- A collection of Turbo Intruder scripts.☆57Updated 2 months ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆121Updated 2 years ago
- Scans remote JavaScript files with Trufflehog + Semgrep to detect leaked secrets☆52Updated 2 months ago
- ☆102Updated 8 months ago
- ai-based domain name generation☆83Updated 2 months ago
- Finds graphql queries in javascript files☆60Updated 10 months ago
- Verizon Burp Extensions: AI Suite☆124Updated 3 weeks ago
- CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).☆115Updated 2 weeks ago
- A recon tool that uses ML to predict subdomains. Then returns those that resolve.☆62Updated last month
- ☆94Updated 6 months ago
- Blinks is a powerful Burp Suite extension that automates active scanning with Burp Suite Pro and enhances its functionality. With the int…☆115Updated 4 months ago
- Extracts URLs from OSINT Archives for Security Insights☆63Updated last week
- Help recon of hostnames from specific ASN or CIDR, thanks to Robtex and BGP.HE☆53Updated 5 months ago
- A Bug Bounty Platform that allows hunters to issue commands over a geo-distributed cluster. The ideal user is someone who is attempting t…☆47Updated 6 months ago
- This extension adds a search bar to the Repeater tab that can be used to highlight all repeater tabs where the request and/or response ma…☆79Updated last year
- A Burp extension to help pentesters copy requests / responses for reports.☆38Updated 3 months ago
- ☠️ Code for the Defcon Workshop☆23Updated 8 months ago
- The Search Engine for Cybersecurity☆73Updated 6 months ago
- Chrome extension for automating CSPT discovery☆77Updated 3 weeks ago
- SALSA 💃⚡ - SALesforce Scanner for Aura (and beyond). Enumeration of vulnerabilities and misconfigurations against Salesforce endpoint.☆21Updated 2 months ago
- Create your own recon & vulnerability scanner with Trickest and GitHub☆49Updated last year
- This Python script automates the process of identifying vulnerabilities in Firebase configurations extracted from APK files.☆31Updated 2 weeks ago
- Vulnerable environments paired with ready-to-use Nuclei templates for security testing and learning! 🚀☆84Updated last week
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆39Updated last year
- ☆37Updated 8 months ago
- A structured red-team prompt for generating ethical hacking tools using AI - designed for use in labs, CTFs, and authorized security asse…☆11Updated last week
- ☆105Updated last year
- A set of open-source community scripts☆61Updated 6 months ago