BishopFox / llm-testing-findings
LLM Testing Findings Templates
☆71Updated last year
Alternatives and similar repositories for llm-testing-findings:
Users that are interested in llm-testing-findings are comparing it to the libraries listed below
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆28Updated 2 months ago
- A research project to add some brrrrrr to Burp☆158Updated 2 months ago
- Nuclei plugins to audit Chrome extensions☆64Updated 9 months ago
- A collection of Turbo Intruder scripts.☆58Updated 3 months ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆33Updated 5 months ago
- Verizon Burp Extensions: AI Suite☆128Updated last week
- ☆47Updated 10 months ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Updated last year
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆76Updated 2 weeks ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆64Updated last year
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆58Updated last year
- ☆110Updated last year
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆133Updated last month
- A fun POC that is built to understand AI security agents.☆31Updated 4 months ago
- A tool to keep AWS pentests and red teams efficient, organized, and stealthy.☆91Updated last year
- This repository hosts several snippets and file related to the BsidesLV 2024 talk about Shadow and Zombie APIs by me☆18Updated 9 months ago
- InfoSec OpenAI Examples☆19Updated last year
- This is a RSS feed collection for all the InfoSec Content Creators☆32Updated last year
- A LLM explicitly designed for getting hacked☆148Updated last year
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆94Updated last year
- A PoC to Simulate Ransomware Attack on AWS Environment☆31Updated 6 months ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆46Updated this week
- Prototype of Full Agentic Application Security Testing, FAAST = SAST + DAST + LLM agents☆41Updated this week
- 🖇️ STRIDE vs. ASVS equivalence table☆76Updated 8 months ago
- The Arcanum Prompt Injection Taxonomy☆66Updated 2 weeks ago
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆45Updated 3 months ago
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆101Updated last year
- ☆36Updated 4 months ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆75Updated last year
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆139Updated 4 months ago