A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)
☆158Dec 18, 2024Updated last year
Alternatives and similar repositories for BrokenHill
Users that are interested in BrokenHill are comparing it to the libraries listed below
Sorting:
- Integrate PyRIT in existing tools☆57Feb 23, 2026Updated 2 weeks ago
- CaptainCredz is a modular and discreet password-spraying tool.☆134Jul 22, 2025Updated 7 months ago
- A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, pe…☆34Mar 5, 2025Updated last year
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Apr 23, 2024Updated last year
- FIX (Financial Information eXchange) protocol fuzzer☆24Jul 22, 2022Updated 3 years ago
- Parses Snaffler output file and generate beautified outputs.☆137Jan 4, 2026Updated 2 months ago
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Sep 8, 2021Updated 4 years ago
- My Notes from Hugging Face AI Agents Course☆20Feb 18, 2025Updated last year
- Example agents for the Dreadnode platform☆24Dec 19, 2025Updated 2 months ago
- ☆33Jan 16, 2026Updated last month
- ☆375Jun 25, 2025Updated 8 months ago
- A research project to add some brrrrrr to Burp☆207Feb 16, 2026Updated 3 weeks ago
- Search exposed EBS volumes for secrets☆302Apr 24, 2023Updated 2 years ago
- ☆154Updated this week
- Takes the original idea of NetCease and adds functionality☆24Feb 6, 2022Updated 4 years ago
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆93Mar 1, 2026Updated last week
- Lightweight LLM Interaction Framework☆407Mar 2, 2026Updated last week
- Cleo Unrestricted file upload and download PoC (CVE-2024-50623)☆25Dec 11, 2024Updated last year
- A repository filled with ideas to break/detect direct syscall techniques☆26Apr 21, 2022Updated 3 years ago
- Deobfuscation library for PoisionPlug.SHADOW's ScatterBrain obfuscator☆80Mar 14, 2025Updated 11 months ago
- A fast + lightweight implementation of the GCG algorithm in PyTorch☆319May 13, 2025Updated 9 months ago
- Audits an AppLocker policy XML and reports weak/misconfigured/risky settings, including actual ACL checks.☆145Feb 16, 2026Updated 3 weeks ago
- ☆92Aug 23, 2021Updated 4 years ago
- Fuzzing Harness and Unpatched Crash Results from Fuzzing Defender MpEngine☆41Jul 29, 2025Updated 7 months ago
- Just another casual shellcode native loader☆25Feb 3, 2022Updated 4 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 3 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Feb 17, 2021Updated 5 years ago
- NOVA: The Prompt Pattern Matching☆109Jan 27, 2026Updated last month
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Jul 28, 2023Updated 2 years ago
- MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.☆336Aug 7, 2024Updated last year
- Tracks cross references and allows fast viewing of pseudocode between references☆13Mar 10, 2025Updated 11 months ago
- A Red Team Activity Hub☆234Feb 25, 2026Updated last week
- An offensive/defense security toolset for discovery, recon and ethical assessment of AI Agents☆1,130Dec 21, 2025Updated 2 months ago
- Claude MCP server to perform analysis on ROADrecon data☆48Mar 30, 2025Updated 11 months ago
- source code for the offsecml framework☆45Jun 6, 2024Updated last year
- Tools for interacting with authentication packages using their individual message protocols☆409Mar 1, 2026Updated last week
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆42Sep 16, 2025Updated 5 months ago
- Reaping treasures from strings in remote processes memory☆284Feb 8, 2025Updated last year
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55May 7, 2025Updated 10 months ago