DalasNoin / redteaming
redteaming a simple language model like gpt2. based on anthropic redteaming paper
☆9Updated 2 years ago
Alternatives and similar repositories for redteaming:
Users that are interested in redteaming are comparing it to the libraries listed below
- ☆13Updated last year
- Enumeration & fingerprint tool☆24Updated 10 months ago
- A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticat…☆10Updated 8 months ago
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchers☆27Updated last month
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- ☆21Updated last year
- Cyber Security Club, Offensive Operations Section (Red Team) learning pathway.☆28Updated last year
- ☆14Updated last year
- Tools used for Pentesting☆22Updated last year
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated last year
- Tool for scanning domains for .git directories.☆12Updated last year
- Automated HTTP Request Repeating With Burp Suite☆35Updated last year
- Simple recon tool automates your recon process☆16Updated last year
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆17Updated 7 months ago
- An Vulnerability detection and Exploitation tool for CVE-2024-7339☆16Updated 5 months ago
- ☆24Updated last year
- "🔍 Subtron: Bash-driven subdomain seeker. Utilizes Subfinder, Amass, Assetfinder, and HTTPX to swiftly uncover live domains. Results sto…☆22Updated 11 months ago
- ☆16Updated last year
- JoomSploit is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆26Updated last year
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 2 years ago
- NetFuzzer is a comprehensive network security assessment tool for internal and external networks, including Firewalls, Routers, Switches,…☆13Updated this week
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆27Updated 2 years ago
- your bestfried for finding LinkedIn Employees on github☆16Updated last year
- Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)☆19Updated 11 months ago
- Monitor your target continuously for new subdomains!☆26Updated last year
- A python script to check if URLs are allowed or disallowed by a robots.txt file.☆21Updated 2 years ago
- ☆12Updated last year