AI Red Teaming Range
☆127Mar 13, 2025Updated last year
Alternatives and similar repositories for RedAiRange
Users that are interested in RedAiRange are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Blackdagger is a DAG-based automation tool specifically used in DevOps, DevSecOps, MLOps, MLSecOps, and Continuous Red Teaming (CART).☆118Jan 21, 2026Updated 3 months ago
- An open-source security platform for the community. Unified SIEM, SOAR, WAF, and more in a single, self-hosted solution.☆127Apr 14, 2026Updated 3 weeks ago
- Weaponize signed .NET ClickOnce applications for initial access by hijacking a dependency DLL via AppDomainManager injection and loading …☆160Feb 14, 2026Updated 2 months ago
- An example vulnerable app that integrates an LLM☆26Apr 5, 2024Updated 2 years ago
- Analyze huge log files (10GB+) instantly in your browser. Zero upload, 100% local processing. Features JSON prettifier, regex filtering, …☆96Apr 1, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆24Jan 21, 2024Updated 2 years ago
- Azure AD RedTeam Full Enumeration Script used to query all aspects of your target Azure tenant.☆72Jul 10, 2024Updated last year
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆83Sep 11, 2025Updated 7 months ago
- ExecEvasion is a lightweight execution-evasion toolkit that generates command variants designed to bypass naive filters and WAF rules by …☆51Jan 31, 2026Updated 3 months ago
- CQL Hub is an open repository of detection and hunting queries for CrowdStrike NextGen SIEM and Falcon LogScale. All queries stored here …☆61Updated this week
- 🎒 An up-to-date collection of precompiled binaries and hacking scripts.☆47May 1, 2026Updated last week
- Homelab sous talos provisioné avec terraform☆32Updated this week
- ☆45Apr 27, 2024Updated 2 years ago
- GromHacks Labs -- The payload lists they don't want you to have. 1,324 injection probes beamed down from the mothership to detect what's …☆34Apr 12, 2026Updated 3 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Offensive security toolkit for Claude Code☆153Apr 1, 2026Updated last month
- ☆14Jul 26, 2025Updated 9 months ago
- Windows Shell Link (LNK) Proof of Concept☆16Jul 19, 2025Updated 9 months ago
- The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security development, testing and reverse engineering.☆11Apr 6, 2020Updated 6 years ago
- Simulation of Akira Ransomware with Invoke-AtomicTest☆18Jul 10, 2024Updated last year
- ☆19Jul 9, 2022Updated 3 years ago
- Wordpress Plugin Canto < 3.0.5 - Remote File Inclusion (RFI) and Remote Code Execution (RCE)☆17Nov 24, 2023Updated 2 years ago
- ☆30Jan 29, 2026Updated 3 months ago
- These FLARE-VM configuration files are designed to be help setup a purpose-built installation, remove unnecessary packages to help stream…☆16Apr 10, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- An Arduino board configuration for a Nano clone with an ATmega328PB incl. Bootloader☆11Aug 12, 2020Updated 5 years ago
- Security Blogs - A simple aggregator for security news/blog☆26Apr 29, 2026Updated last week
- A simple script that edits the XML of a macro-enabled Word document (.docm or Word 97 document) to add a reference to a remote stylesheet…☆11Oct 5, 2022Updated 3 years ago
- ☆33Nov 10, 2025Updated 6 months ago
- Copy as FFUF Command for Burp Suite☆10Jun 12, 2024Updated last year
- A tool that monitors a local Git repository, generates AI-powered summaries of recent commits (daily, weekly, or monthly), and sends them…☆13Apr 12, 2025Updated last year
- Azure DevOps Services Attack Toolkit☆152Apr 29, 2026Updated last week
- POC tool to abuse windows server failover clusters☆56Aug 7, 2025Updated 9 months ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆151Feb 10, 2025Updated last year
- Websites and tools for OSINT investigations pertaining to Israel☆27May 12, 2025Updated 11 months ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆51Mar 2, 2022Updated 4 years ago
- AIGoat - Open-source AI security playground for LLM red teaming. AI Goat provides hands-on labs covering the full OWASP LLM Top 10 with p…☆51Apr 24, 2026Updated 2 weeks ago
- ☆13Nov 24, 2019Updated 6 years ago
- ☆38Aug 6, 2025Updated 9 months ago
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated last year