BishopFox / rainkLinks
Use LLMs for document ranking
☆160Updated 9 months ago
Alternatives and similar repositories for raink
Users that are interested in raink are comparing it to the libraries listed below
Sorting:
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆54Updated last year
- Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.☆133Updated 8 months ago
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆83Updated 8 months ago
- Automated vulnerability discovery and annotation☆67Updated last year
- Use LLMs to rank anything.☆107Updated last month
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55Updated 8 months ago
- ☆71Updated 2 months ago
- Lightweight LLM Interaction Framework☆404Updated this week
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆108Updated 7 months ago
- A utility to inspect, validate, sign and verify machine learning model files.☆64Updated 11 months ago
- A sandbox environment designed for loading, running and profiling a wide range of files, including machine learning models, ELFs, Pickle,…☆339Updated last week
- Modular web-application honeypot platform built using go and gin☆63Updated last year
- ☆345Updated 2 weeks ago
- A research project to add some brrrrrr to Burp☆196Updated 11 months ago
- Hijack a slack bot to phish your way in☆57Updated 6 months ago
- Protection against HTML smuggling attacks.☆101Updated 6 months ago
- A Model Context Protocol server that connects AI assistants like Claude to AWS security services, allowing them to autonomously query, in…☆79Updated 5 months ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆59Updated 6 months ago
- PWN is an open security automation framework that aims to stand on the shoulders of security giants, promoting trust and innovation.☆67Updated last week
- Identify hardcoded secrets in static structured text (version 2)☆96Updated 11 months ago
- MCP Snitch is a macOS application that intercepts and monitors MCP server communications, providing security analysis, access control, an…☆92Updated 3 months ago
- ☆40Updated 2 months ago
- Powerful LLM Query Framework with YAML Prompt Templates. Made for Automation☆34Updated 4 months ago
- Experimental tools to backdoor large language models by re-writing their system prompts at a raw parameter level. This allows you to pote…☆202Updated 3 months ago
- An open-source security suite aiming to combine structural code analysis with AI-powered vulnerability detection. Built for advanced stru…☆90Updated last week
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆44Updated 8 months ago
- using ML models for red teaming☆45Updated 2 years ago
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆40Updated 4 months ago
- ☆74Updated last month
- https://arxiv.org/abs/2412.02776☆67Updated last year