AI Red Teaming Range
☆122Mar 13, 2025Updated 11 months ago
Alternatives and similar repositories for RedAiRange
Users that are interested in RedAiRange are comparing it to the libraries listed below
Sorting:
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆16Sep 10, 2024Updated last year
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆14Dec 26, 2025Updated 2 months ago
- Hands-on MCP security lab: 10 real incidents reproduced with vulnerable/secure MCP servers, pytest regressions, and Claude/Cursor battle-…☆84Dec 3, 2025Updated 3 months ago
- Blackdagger is a DAG-based automation tool specifically used in DevOps, DevSecOps, MLOps, MLSecOps, and Continuous Red Teaming (CART).☆118Jan 21, 2026Updated last month
- A comprehensive guide to adversarial testing and security evaluation of AI systems, helping organizations identify vulnerabilities before…☆41Feb 19, 2026Updated 2 weeks ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆23Jan 21, 2024Updated 2 years ago
- An example vulnerable app that integrates an LLM☆26Apr 5, 2024Updated last year
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆26Mar 3, 2023Updated 3 years ago
- 利用 360 每天公开的 恶意DGA 域名信息 http://data.netlab.360.com/feeds/dga/dga.txt ,通过分析 wireshark 抓到的 pcap文件,去匹配相应的 DNS 请求,试图发现内网受感染的地址☆20May 24, 2018Updated 7 years ago
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆21Mar 9, 2022Updated 3 years ago
- Websites and tools for OSINT investigations pertaining to Israel☆26May 12, 2025Updated 9 months ago
- Network labs☆27Apr 27, 2025Updated 10 months ago
- Weaponize signed .NET ClickOnce applications for initial access by hijacking a dependency DLL via AppDomainManager injection and loading …☆143Feb 14, 2026Updated 3 weeks ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Jul 19, 2024Updated last year
- ☆50Feb 6, 2026Updated last month
- Hacking environment installation scripts for OS X☆28Jan 16, 2022Updated 4 years ago
- POC tool to abuse windows server failover clusters☆55Aug 7, 2025Updated 7 months ago
- Analyze huge log files (10GB+) instantly in your browser. Zero upload, 100% local processing. Features JSON prettifier, regex filtering, …☆87Feb 25, 2026Updated last week
- Scripts and tool for iOS app reversing☆27Oct 1, 2021Updated 4 years ago
- Bu bir not defteri programıdır. Sayfalar halinde not tutmanızı sağlar ve sadece Linux işletim sistemi için hazırlanmıştır. Yazdığınız not…☆13Apr 13, 2025Updated 10 months ago
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Aug 6, 2024Updated last year
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- ☆10Feb 12, 2026Updated 3 weeks ago
- 安卓远控,天线6.0 无限使用版☆11Sep 9, 2023Updated 2 years ago
- Azure AD RedTeam Full Enumeration Script used to query all aspects of your target Azure tenant.☆70Jul 10, 2024Updated last year
- Open-Source CLI Penetration Testing Tool To Automate Various Processes☆50Jun 18, 2024Updated last year
- Transformer un ancien téléphone Android en outil puissant.☆23Jul 28, 2025Updated 7 months ago
- An application that displays a map and graphs showing solar irradiance forecasts in solar farms in Georgia using data from the National S…☆10Oct 15, 2021Updated 4 years ago
- agisoft photogrammetry processing scripts☆12Mar 18, 2016Updated 9 years ago
- This is a bash script used for ISPConfig 3 server migrations☆15Sep 13, 2016Updated 9 years ago
- Utility for parsing Bro log files into CSV or JSON format☆41Jan 12, 2023Updated 3 years ago
- 计算概论大作业,Qt,猫捉老鼠小游戏☆12Jan 15, 2019Updated 7 years ago
- A Streamlit-based chatbot application using Gemini models for NLP. Features include light/dark mode toggle, model selection (Gemini 1.5 F…☆10May 23, 2024Updated last year
- Fixes corrupted Magic Bytes for PNG, JPG and JPEG☆10Aug 4, 2021Updated 4 years ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- Open Data and sources for OSINT in Tajikistan☆13Jan 17, 2025Updated last year
- Infrastructure Bot for your organization☆10Jun 9, 2025Updated 8 months ago
- Python Exploitation Framework☆30Updated this week
- A generic Apigee proxy to give CRUD access to Firestore collections, to AppSheet Applications.☆12Nov 22, 2021Updated 4 years ago