Adversarial Machine Learning (AML) Capture the Flag (CTF)
☆113Mar 14, 2024Updated last year
Alternatives and similar repositories for HackThisAI
Users that are interested in HackThisAI are comparing it to the libraries listed below
Sorting:
- CTF challenges designed and implemented in machine learning applications☆203Oct 8, 2025Updated 4 months ago
- Open YARA scan- and search engine☆26Feb 23, 2025Updated last year
- ☆27Aug 8, 2021Updated 4 years ago
- Coleção de informações sobre POS's disponíveis no mercado Brasileiro, com propósito educativo.☆11Sep 6, 2020Updated 5 years ago
- Learn AI security through a series of vulnerable LLM CTF challenges. No sign ups, no cloud fees, run everything locally on your system.☆318Aug 22, 2024Updated last year
- ☆11Oct 25, 2021Updated 4 years ago
- Design resources for developers is a selection of more than 400 sites to facilitate developers.☆13Dec 8, 2022Updated 3 years ago
- ☆161Feb 6, 2026Updated 3 weeks ago
- Dragon-GPT uses Chat-GPT, or local LLM, to execute automatic and AI-powered threat modeling analysis on a given OWASP Threat Dragon diagr…☆41Jun 20, 2025Updated 8 months ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Feb 10, 2022Updated 4 years ago
- ☆15Aug 6, 2021Updated 4 years ago
- Create subdomains and files wordlists from your browser history☆13Jan 10, 2023Updated 3 years ago
- python3 scripts to help with aws triage needs☆15Feb 11, 2022Updated 4 years ago
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)☆17Jan 11, 2023Updated 3 years ago
- Exfiltrate data from a compromised target using covert channels☆17Mar 20, 2021Updated 4 years ago
- ☆10Dec 4, 2020Updated 5 years ago
- ☆21Jun 12, 2024Updated last year
- ☆43Nov 15, 2025Updated 3 months ago
- Notes and helper scripts/files/etc from when I passed my OSCP☆19Sep 17, 2019Updated 6 years ago
- A standalone tool for logging shell commands to GhostWriter automatically☆19Aug 24, 2024Updated last year
- ☆20Feb 9, 2024Updated 2 years ago
- Very Simple Fuzzer☆21Jun 12, 2020Updated 5 years ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55May 7, 2025Updated 9 months ago
- A general purpose foundation for cloud-based fuzzing and mutation testing jobs☆22Jan 15, 2026Updated last month
- Challenge Python☆19Apr 26, 2023Updated 2 years ago
- My inputs for the LLM Gandalf made by Lakera☆49Sep 18, 2023Updated 2 years ago
- An arduino UARTFuzzer☆50Oct 22, 2022Updated 3 years ago
- Exercises Galois theory D. Cox☆12Jun 29, 2023Updated 2 years ago
- If you have any questions, please open an issue.☆25Apr 6, 2022Updated 3 years ago
- a CLI that provides a generic automation layer for assessing the security of ML models☆912Jul 18, 2025Updated 7 months ago
- Mythic Developer Series: Workshop Golang Agent☆25Jun 27, 2023Updated 2 years ago
- Python GUI for seeing what's happening inside a fuzzer☆26Oct 1, 2021Updated 4 years ago
- TypeScript/JavaScript client libraries for Sliver☆24Feb 15, 2026Updated 2 weeks ago
- Ansible build for Afl++ Frida-Mode☆25Jun 8, 2024Updated last year
- A LLM explicitly designed for getting hacked☆166Aug 2, 2023Updated 2 years ago
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆109Feb 16, 2024Updated 2 years ago
- As seen at DEF CON and O'Reilly Live Trainings☆24Jul 30, 2025Updated 7 months ago
- Multi-agent system (MAS) hijacking demos☆42Feb 22, 2026Updated last week