ErdemOzgen / RedAiRangeView external linksLinks
AI Red Teaming Range
☆116Mar 13, 2025Updated 11 months ago
Alternatives and similar repositories for RedAiRange
Users that are interested in RedAiRange are comparing it to the libraries listed below
Sorting:
- An open-source security platform for the community. Unified SIEM, SOAR, WAF, and more in a single, self-hosted solution.☆122Dec 4, 2025Updated 2 months ago
- A comprehensive guide to adversarial testing and security evaluation of AI systems, helping organizations identify vulnerabilities before…☆31Jan 1, 2026Updated last month
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆15Sep 10, 2024Updated last year
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆23Jan 21, 2024Updated 2 years ago
- ☆19Jul 9, 2022Updated 3 years ago
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆26Mar 3, 2023Updated 2 years ago
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆21Mar 9, 2022Updated 3 years ago
- A PowerShell solution to discover visible SMB shares, test for access rights, inventory accessible files and flag human readable file con…☆28Mar 13, 2023Updated 2 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Jul 19, 2024Updated last year
- POC tool to abuse windows server failover clusters☆53Aug 7, 2025Updated 6 months ago
- Hacking environment installation scripts for OS X☆28Jan 16, 2022Updated 4 years ago
- Scripts and tool for iOS app reversing☆27Oct 1, 2021Updated 4 years ago
- 安卓远控,天线6.0 无限使用版☆11Sep 9, 2023Updated 2 years ago
- ☆10Updated this week
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Aug 6, 2024Updated last year
- ☆10Feb 5, 2026Updated last week
- Growing collection of Spicy-based protocol and file analyzers for Zeek☆32Sep 16, 2024Updated last year
- An application that displays a map and graphs showing solar irradiance forecasts in solar farms in Georgia using data from the National S…☆10Oct 15, 2021Updated 4 years ago
- This is a bash script used for ISPConfig 3 server migrations☆15Sep 13, 2016Updated 9 years ago
- Cradlepoint ECM Command Line Interface☆11Mar 7, 2023Updated 2 years ago
- Utility for parsing Bro log files into CSV or JSON format☆41Jan 12, 2023Updated 3 years ago
- 图片炫酷动画展示 在线演示https://hanruto.github.io/image-show/imageCss.html☆12Feb 18, 2017Updated 8 years ago
- APCMini streamdeck tool for OBS studio☆10Apr 28, 2022Updated 3 years ago
- A Repository for Miscellaneous Scripts☆11Jul 18, 2014Updated 11 years ago
- 计算概论大作业,Qt,猫捉老鼠小游戏☆12Jan 15, 2019Updated 7 years ago
- Identify QuasarRAT/AsyncRAT/DcRAT/VenomRAT servers through scanning☆13Apr 20, 2024Updated last year
- Indian agricultural analysis☆11Nov 20, 2018Updated 7 years ago
- The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security development, testing and reverse engineering.☆11Apr 6, 2020Updated 5 years ago
- Fixes corrupted Magic Bytes for PNG, JPG and JPEG☆10Aug 4, 2021Updated 4 years ago
- Memory Forensic System on Cloud☆92Dec 21, 2023Updated 2 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- The Office 365 data Splunk app enables data analysts and IT administrators to import the data they need to get their organization more pr…☆16Jun 14, 2023Updated 2 years ago
- The Eureka Lab Series is designed for learners at all levels of experience and interest in security concepts and technologies.☆10Nov 30, 2025Updated 2 months ago
- Open Data and sources for OSINT in Tajikistan☆13Jan 17, 2025Updated last year
- Common device configuration files for SM6375 based Motorola devices☆10Jan 1, 2026Updated last month
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- Infrastructure Bot for your organization☆10Jun 9, 2025Updated 8 months ago
- 🎒 An up-to-date collection of precompiled binaries and hacking scripts.☆47Feb 1, 2026Updated last week