AI Red Teaming Range
☆125Mar 13, 2025Updated last year
Alternatives and similar repositories for RedAiRange
Users that are interested in RedAiRange are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Custom Black arch based docker container for continuous automated red teaming☆24Jan 21, 2026Updated 2 months ago
- Blackdagger is a DAG-based automation tool specifically used in DevOps, DevSecOps, MLOps, MLSecOps, and Continuous Red Teaming (CART).☆118Jan 21, 2026Updated 2 months ago
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆17Sep 10, 2024Updated last year
- An open-source security platform for the community. Unified SIEM, SOAR, WAF, and more in a single, self-hosted solution.☆125Updated this week
- Hands-on MCP security lab: 10 real incidents reproduced with vulnerable/secure MCP servers, pytest regressions, and Claude/Cursor battle-…☆87Dec 3, 2025Updated 4 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Analyze Android native `.so` files☆122Jul 28, 2025Updated 8 months ago
- An example vulnerable app that integrates an LLM☆26Apr 5, 2024Updated 2 years ago
- A tool to grab session cookies of any website from an android phone and by-pass 2FA.☆12May 8, 2020Updated 5 years ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆24Jan 21, 2024Updated 2 years ago
- GitHub Action that generates and commits a live SVG world map of cyber threats using Shodan data.☆26Updated this week
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆83Sep 11, 2025Updated 7 months ago
- My Reverse Shell Cheat Sheet☆13Mar 2, 2022Updated 4 years ago
- Temodar Agent is an AI-powered WordPress plugin and theme security analysis platform built for security researchers, product security tea…☆56Updated this week
- Offensive security toolkit for Claude Code☆132Apr 1, 2026Updated 2 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A PowerShell-based malware designed to completely disable all Windows security features, featuring UAC bypass and advanced anti-virtualiz…☆66Feb 14, 2026Updated 2 months ago
- Repository for tools used for the OSCP☆24Sep 18, 2025Updated 7 months ago
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆173Jul 31, 2025Updated 8 months ago
- 鸿蒙客户端测试靶场☆29Dec 4, 2025Updated 4 months ago
- ☆14Jul 26, 2025Updated 8 months ago
- Simulation of Akira Ransomware with Invoke-AtomicTest☆18Jul 10, 2024Updated last year
- The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security development, testing and reverse engineering.☆11Apr 6, 2020Updated 6 years ago
- ☆19Jul 9, 2022Updated 3 years ago
- Wordpress Plugin Canto < 3.0.5 - Remote File Inclusion (RFI) and Remote Code Execution (RCE)☆17Nov 24, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A Security Operations playbook to assist blue teamers from day-to-day tasks to Digital Forensics and Incident Response (DFIR) activities.☆22Apr 7, 2026Updated last week
- Security Blogs - A simple aggregator for security news/blog☆25Mar 31, 2026Updated 2 weeks ago
- These FLARE-VM configuration files are designed to be help setup a purpose-built installation, remove unnecessary packages to help stream…☆16Apr 10, 2024Updated 2 years ago
- ☆48Dec 30, 2025Updated 3 months ago
- An Arduino board configuration for a Nano clone with an ATmega328PB incl. Bootloader☆11Aug 12, 2020Updated 5 years ago
- A simple script that edits the XML of a macro-enabled Word document (.docm or Word 97 document) to add a reference to a remote stylesheet…☆12Oct 5, 2022Updated 3 years ago
- ☆33Nov 10, 2025Updated 5 months ago
- Copy as FFUF Command for Burp Suite☆10Jun 12, 2024Updated last year
- Reverse engineering UI for Frida and Android☆16Oct 10, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- AI Red Teaming playground labs to run AI Red Teaming trainings including infrastructure.☆1,903Feb 13, 2026Updated 2 months ago
- POC tool to abuse windows server failover clusters☆56Aug 7, 2025Updated 8 months ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- Your bloodhound for hidden info in those JS files.☆17May 13, 2024Updated last year
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- Websites and tools for OSINT investigations pertaining to Israel☆27May 12, 2025Updated 11 months ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆51Mar 2, 2022Updated 4 years ago