BishopFox / BrokenHill
A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)
☆38Updated this week
Related projects ⓘ
Alternatives and complementary repositories for BrokenHill
- using ML models for red teaming☆39Updated last year
- Create tar/zip archives that try to exploit zipslip vulnerability.☆45Updated last month
- An interactive CLI application for interacting with authenticated Jupyter instances.☆49Updated 7 months ago
- Blogpost series showcasing interesting cloud - web app security bugs☆46Updated last year
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆69Updated 3 weeks ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆23Updated 2 months ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆60Updated last month
- Tool to spray AWS Console IAM Logins☆25Updated 2 years ago
- A National Vulnerability Database (NVD) API query tool☆17Updated last year
- A multifaceted security tool which leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting and more.☆33Updated 2 weeks ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆36Updated 6 months ago
- Basic protection against HTML smuggling attempts.☆30Updated last week
- Collection of Docker honeypot logs from 2021 - 2024☆35Updated last month
- Determine privileges from cloud credentials via brute-force testing.☆64Updated 2 months ago
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆58Updated 10 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆29Updated 5 months ago
- ☆58Updated last year
- source code for the offsecml framework☆35Updated 5 months ago
- A Simple CVE-2022-39299 PoC exploit generator to bypass authentication in SAML SSO Integrations using vulnerable versions of passport-sam…☆17Updated last year
- 🌐 Visualize and explore IaC ✒️ Create and share notes in VS Code 🤝 Sync notes and findings in real-time with friends☆70Updated 9 months ago
- ☆51Updated last year
- Additional active scan checks for BURP☆20Updated last month
- Manage attack surface data on Elasticsearch☆20Updated 11 months ago
- C2 Automation using Linode☆78Updated 2 years ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆88Updated 4 months ago
- Determine the running software version of a remote F5 BIG-IP management interface.☆63Updated 10 months ago
- Java archive implant toolkit.☆53Updated 2 months ago
- Simple C2 using GitHub repository as comms channel.☆25Updated 2 weeks ago