BishopFox / llm-testing-findings
LLM Testing Findings Templates
☆69Updated last year
Alternatives and similar repositories for llm-testing-findings:
Users that are interested in llm-testing-findings are comparing it to the libraries listed below
- A research project to add some brrrrrr to Burp☆137Updated last month
- Nuclei plugins to audit Chrome extensions☆64Updated 8 months ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆58Updated last year
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆132Updated this week
- GCP GOAT is the vulnerable application for learn the GCP Security☆64Updated last year
- ☆33Updated 3 months ago
- A tool to keep AWS pentests and red teams efficient, organized, and stealthy.☆90Updated last year
- This repository hosts several snippets and file related to the BsidesLV 2024 talk about Shadow and Zombie APIs by me☆18Updated 7 months ago
- boostsecurityio/lotp☆115Updated last week
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆40Updated last year
- 🖇️ STRIDE vs. ASVS equivalence table☆76Updated 6 months ago
- InfoSec OpenAI Examples☆19Updated last year
- ☆43Updated 9 months ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆26Updated 8 months ago
- ☆110Updated last year
- A fun POC that is built to understand AI security agents.☆25Updated 2 months ago
- Blogpost series showcasing interesting cloud - web app security bugs☆47Updated last year
- ☆58Updated last year
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆103Updated last year
- This is a RSS feed collection for all the InfoSec Content Creators☆32Updated last year
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆102Updated last month
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆138Updated 2 months ago
- A LLM explicitly designed for getting hacked☆139Updated last year
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆101Updated last year
- An LLM and OCR based Indicator of Compromise Extraction Tool☆33Updated 3 months ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆42Updated 6 months ago