LLM Vulnerable Application
☆13Aug 19, 2023Updated 2 years ago
Alternatives and similar repositories for Delta
Users that are interested in Delta are comparing it to the libraries listed below
Sorting:
- Noodle [Moodle RCE] (v3.4.1) - CVE-2018-1133☆10Mar 15, 2019Updated 7 years ago
- My Reverse Shell Cheat Sheet☆13Mar 2, 2022Updated 4 years ago
- TensorFlow materials☆13Jan 8, 2021Updated 5 years ago
- Some simple scripts that I use during bug bounty hunting in Android Apps☆28Jan 30, 2025Updated last year
- ☆11Jul 8, 2024Updated last year
- Vulnerable LLM Application☆14Jan 1, 2024Updated 2 years ago
- Resources to learn about Insecure Deserialization☆17Jul 12, 2024Updated last year
- Firebug-like dir() for Node.js.☆15Apr 9, 2011Updated 14 years ago
- An Automated udemy coupons scraper which scrapes coupons and autopost the result in blogspot post☆23Nov 2, 2021Updated 4 years ago
- Natch: инструмент определения поверхности атаки☆33Mar 12, 2026Updated last week
- Awesome Privilege Escalation☆145Oct 18, 2022Updated 3 years ago
- Solutions of xchg rax,rax☆15Jun 2, 2020Updated 5 years ago
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- Tools for Attacking Pleasant Password Server☆22Sep 19, 2023Updated 2 years ago
- CTF Writeups☆15Aug 20, 2023Updated 2 years ago
- polymorphic webshells☆30Oct 20, 2017Updated 8 years ago
- Crack passwords with Hashcat using a Discord Bot.☆28Oct 30, 2023Updated 2 years ago
- Turn your Raspberry Pi into router☆26Mar 29, 2014Updated 11 years ago
- NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems [USENIX Security '23]☆20Nov 17, 2022Updated 3 years ago
- Оценка ИЦБ ДОМ.РФ и других с симуляционными моделями для короткой ставки и досрочных погашений☆10Oct 14, 2019Updated 6 years ago
- Js File Scanner☆11Mar 30, 2021Updated 4 years ago
- Prettiest C++ generator/coroutine implementation.☆14Dec 17, 2015Updated 10 years ago
- ☆22Jul 13, 2022Updated 3 years ago
- A machine learning library for economics and finance☆10Feb 28, 2024Updated 2 years ago
- Reconstructing Electron Microscopic(EM) image stacks of mouse brain tissue requires many hours of manual annotation and proofreading, whi…☆12Aug 29, 2017Updated 8 years ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆25Jul 14, 2024Updated last year
- A set of vulnerable machines rendered by Packer and Ansible scripts.☆13Feb 15, 2021Updated 5 years ago
- Easy crash-reporting for Frida-based applications.☆18Aug 19, 2019Updated 6 years ago
- ☆18Jun 15, 2024Updated last year
- Secure terminal-based IDE for local JS development☆25Dec 1, 2025Updated 3 months ago
- An example vulnerable app that integrates an LLM☆26Apr 5, 2024Updated last year
- A place in which I put various resources from my classes, presentations, and videos.☆45Dec 10, 2023Updated 2 years ago
- APK Infrastructure Investigator☆64Jun 20, 2023Updated 2 years ago
- A not-curated list of cloud hacking labs☆26Apr 18, 2024Updated last year
- BcryptMontoya is a powerful plugin for Burp Suite that allows you to effortlessly modify HTTP requests and responses passing through the …☆15Jan 12, 2026Updated 2 months ago
- IAT Unhooking proof-of-concept☆34Apr 7, 2024Updated last year
- A websocket-based reverse (javascript) shell for XSS attacks.☆29Sep 2, 2022Updated 3 years ago
- The purpose of Raster Fairy is to transform any kind of 2D point cloud into a regular raster whilst trying to preserve the neighborhood r…☆13Apr 18, 2017Updated 8 years ago
- ☆31Jan 28, 2020Updated 6 years ago