Arcanum-Sec / arc_pi_taxonomyLinks
The Arcanum Prompt Injection Taxonomy
☆270Updated last month
Alternatives and similar repositories for arc_pi_taxonomy
Users that are interested in arc_pi_taxonomy are comparing it to the libraries listed below
Sorting:
- Payloads for AI Red Teaming and beyond☆284Updated last month
- A Go-based utility that processes input through multiple AI models concurrently (OpenAI, Claude, and Gemini) and provides a summarized co…☆86Updated 3 months ago
- AI for Ethical Hacking - Workshop☆218Updated last month
- A research project to add some brrrrrr to Burp☆191Updated 7 months ago
- A collection of Turbo Intruder scripts.☆65Updated 8 months ago
- ☆190Updated 5 months ago
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆223Updated 9 months ago
- ☆328Updated 3 months ago
- AI-powered ffuf wrapper☆538Updated 10 months ago
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆226Updated 2 weeks ago
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆362Updated last month
- A LLM explicitly designed for getting hacked☆162Updated 2 years ago
- Abuse trust-boundaries to bypass firewalls and network controls☆375Updated 2 months ago
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆219Updated last year
- Websec interview questions by tib3rius answered☆311Updated last year
- ☆105Updated last year
- ☆500Updated last year
- The repository contains useful GitHub dorks for finding open-source vulnerabilities.☆88Updated last year
- A smarter web fuzzing tool that combines local LLM models and ffuf to optimize directory and file discovery☆320Updated 10 months ago
- Recon MindMap (RMM)☆163Updated last year
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆250Updated 2 weeks ago
- Learn AI security through a series of vulnerable LLM CTF challenges. No sign ups, no cloud fees, run everything locally on your system.☆302Updated last year
- Find CVEs associated to Linux and public exploits on github☆119Updated 5 months ago
- Security automation with n8n ideas: 100+ Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.☆131Updated 2 weeks ago
- ☆145Updated 11 months ago
- A OWASP Based Checklist With 80+ Test Cases☆152Updated 2 years ago
- The Distributed Scanning Framework for Everybody! Control Your Infrastructure, Scale Your Scanning—On Your Terms. Easily distribute arbit…☆628Updated last month
- Damn Vulnerable API☆78Updated last week
- ☆199Updated last year
- A web CTF for training developers in bug hunting and secure coding!☆100Updated 8 months ago