Arcanum-Sec / arc_pi_taxonomyLinks
The Arcanum Prompt Injection Taxonomy
☆411Updated last month
Alternatives and similar repositories for arc_pi_taxonomy
Users that are interested in arc_pi_taxonomy are comparing it to the libraries listed below
Sorting:
- Payloads for AI Red Teaming and beyond☆315Updated 4 months ago
- AI for Ethical Hacking - Workshop☆242Updated last month
- A Go-based utility that processes input through multiple AI models concurrently (OpenAI, Claude, and Gemini) and provides a summarized co…☆87Updated 6 months ago
- A research project to add some brrrrrr to Burp☆196Updated 11 months ago
- ☆348Updated 6 months ago
- AI-powered ffuf wrapper☆633Updated last month
- A collection of Turbo Intruder scripts.☆66Updated 11 months ago
- A security system to protect your vibecoded apps☆233Updated this week
- A LLM explicitly designed for getting hacked☆164Updated 2 years ago
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆237Updated last year
- The repository contains useful GitHub dorks for finding open-source vulnerabilities.☆92Updated last year
- ☆233Updated 3 weeks ago
- Websec interview questions by tib3rius answered☆307Updated 2 years ago
- ☆210Updated 10 months ago
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆324Updated 2 months ago
- ☆194Updated 8 months ago
- Prompt Injections Everywhere☆176Updated last year
- OWASP Foundation web repository☆628Updated 3 weeks ago
- ☆516Updated last year
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆383Updated 2 months ago
- Damn Vulnerable API☆83Updated 3 months ago
- A smarter web fuzzing tool that combines local LLM models and ffuf to optimize directory and file discovery☆378Updated last year
- This repo contains the code for my secure code review challenges. People used this as the primary resource to pass FAANG AppSec interview…☆296Updated last month
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆223Updated last year
- Abuse trust-boundaries to bypass firewalls and network controls☆385Updated 5 months ago
- ☆166Updated last year
- ☆205Updated last year
- Learn AI security through a series of vulnerable LLM CTF challenges. No sign ups, no cloud fees, run everything locally on your system.☆314Updated last year
- Recon MindMap (RMM)☆168Updated last year
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆262Updated 3 months ago