LLM Vulnerable Application
☆13Aug 19, 2023Updated 2 years ago
Alternatives and similar repositories for Delta
Users that are interested in Delta are comparing it to the libraries listed below
Sorting:
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- Vulnerable LLM Application☆14Jan 1, 2024Updated 2 years ago
- Noodle [Moodle RCE] (v3.4.1) - CVE-2018-1133☆10Mar 15, 2019Updated 6 years ago
- My Reverse Shell Cheat Sheet☆13Mar 2, 2022Updated 3 years ago
- An example vulnerable app that integrates an LLM☆26Apr 5, 2024Updated last year
- Awesome Privilege Escalation☆145Oct 18, 2022Updated 3 years ago
- Tools for Attacking Pleasant Password Server☆22Sep 19, 2023Updated 2 years ago
- Secure terminal-based IDE for local JS development☆25Dec 1, 2025Updated 2 months ago
- APK Infrastructure Investigator☆64Jun 20, 2023Updated 2 years ago
- A tool for generating and detecting Unicode domains to identify phishing URLs, aimed at assisting cybersecurity professionals in recogniz…☆30Apr 29, 2025Updated 10 months ago
- FEAT, short for Factcheck Explorer Analysis Tool, is designed to facilitate the exploration, analysis, and visualization of fact-checking…☆31Apr 11, 2024Updated last year
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆26Jul 14, 2024Updated last year
- ☆23Jun 30, 2021Updated 4 years ago
- Natch: инструмент определения поверхности атаки☆33Feb 18, 2026Updated last week
- An Automated udemy coupons scraper which scrapes coupons and autopost the result in blogspot post☆23Nov 2, 2021Updated 4 years ago
- ☆29May 30, 2024Updated last year
- A user enumeration tool for Slack.☆36Jun 10, 2024Updated last year
- Crack passwords with Hashcat using a Discord Bot.☆28Oct 30, 2023Updated 2 years ago
- A websocket-based reverse (javascript) shell for XSS attacks.☆30Sep 2, 2022Updated 3 years ago
- Some simple scripts that I use during bug bounty hunting in Android Apps☆28Jan 30, 2025Updated last year
- Simple Python script to sort nuclei scans by severity and URL☆29May 24, 2023Updated 2 years ago
- Final assignment for the course Data Visualization with Python, part of IBM Data Science Professional Certification on Coursera☆11Jun 22, 2020Updated 5 years ago
- ☆29May 14, 2019Updated 6 years ago
- ☆37Feb 12, 2018Updated 8 years ago
- A deliberately insecure Java web application☆44Oct 23, 2025Updated 4 months ago
- ☆10Sep 24, 2021Updated 4 years ago
- ☆33Feb 27, 2024Updated 2 years ago
- Sliver agents for Mythic☆48Nov 18, 2024Updated last year
- Оценка ИЦБ ДОМ.РФ и других с симуляционными моделями для короткой ставки и досрочных погашений☆10Oct 14, 2019Updated 6 years ago
- A cheat sheet that contains common enumeration and attack methods for Mail Server.☆41Oct 18, 2022Updated 3 years ago
- Automate the build of a vulnerable AD environment.☆40Aug 19, 2022Updated 3 years ago
- ☆10Mar 11, 2024Updated last year
- Helm plugin for install charts from Github Releases☆12Jul 25, 2023Updated 2 years ago
- ☆14Feb 19, 2023Updated 3 years ago
- ☆12Jul 4, 2024Updated last year
- Hack The Box OSCP-like VMs writeups☆11Oct 11, 2020Updated 5 years ago
- Python client for McAfee ePolicy Orchestrator☆15Mar 12, 2021Updated 4 years ago
- This tool will help you to find CVEs, exploits, or possible 0-Days for a specific technology.☆16Jun 11, 2024Updated last year
- It is a ML based project developed in python language. It detect and recognize the face and mark attendance of that person. It's good poi…☆10Aug 13, 2023Updated 2 years ago