BishopFox / BrokenHill
A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)
☆43Updated this week
Related projects ⓘ
Alternatives and complementary repositories for BrokenHill
- using ML models for red teaming☆39Updated last year
- Golang CLI binary used for installing and managing Ghostwriter☆14Updated 2 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆35Updated 7 months ago
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆23Updated 4 months ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 2 years ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆47Updated 8 months ago
- ☆38Updated 5 months ago
- ☆58Updated last year
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆69Updated last month
- An Evil OIDC Server☆51Updated 2 years ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆45Updated 2 months ago
- Blogpost series showcasing interesting cloud - web app security bugs☆46Updated last year
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆23Updated 3 months ago
- ☆51Updated last year
- Enumerate AWS permissions and resources.☆64Updated 2 years ago
- Additional active scan checks for BURP☆20Updated last month
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆57Updated 2 years ago
- Living off the land searches for explorer and sharepoint☆53Updated 3 weeks ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆30Updated last year
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- ☆34Updated 8 months ago
- ☆28Updated 3 months ago
- Determine privileges from cloud credentials via brute-force testing.☆64Updated 3 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆29Updated 5 months ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆42Updated last year
- Tool to perform GCP Domain Wide Delegation abuse and access Gmail and Drive data☆43Updated last year
- Collection of Docker honeypot logs from 2021 - 2024☆35Updated last month
- Nemesis agent for Mythic☆25Updated 2 months ago
- A collection of my Semgrep rules☆47Updated last year
- LLM Testing Findings Templates☆65Updated 9 months ago