JosephTLucas / vger
An interactive CLI application for interacting with authenticated Jupyter instances.
☆53Updated this week
Alternatives and similar repositories for vger
Users that are interested in vger are comparing it to the libraries listed below
Sorting:
- using ML models for red teaming☆43Updated last year
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆70Updated last week
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆41Updated 8 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated 7 months ago
- ☆30Updated 3 weeks ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆47Updated 7 months ago
- ☆15Updated last month
- ☆47Updated 11 months ago
- Determine privileges from cloud credentials via brute-force testing.☆67Updated 8 months ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆37Updated 7 months ago
- source code for the offsecml framework☆40Updated 11 months ago
- ☆35Updated 9 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆46Updated 2 months ago
- A simple POC to expose Mythic as a MCP server☆61Updated last month
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated 8 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated last year
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆77Updated 6 months ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Updated 2 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆109Updated this week
- Hijack a slack bot to phish your way in☆55Updated last month
- ☆16Updated last year
- A PoC to Simulate Ransomware Attack on AWS Environment☆31Updated 6 months ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Updated last year
- A Model Context Protocol server that connects AI assistants like Claude to AWS security services, allowing them to autonomously query, in…☆39Updated last week
- Data Scientists Go To Jupyter☆62Updated 2 months ago
- A security-first linter for code that shouldn't need linting☆16Updated last year
- Autonomous AI C2☆30Updated 9 months ago
- Burp Suite extension for testing Passkey systems.☆69Updated last month
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40Updated 2 years ago
- Blogpost series showcasing interesting cloud - web app security bugs☆47Updated last year