KadirArslan / Mithra-ScannerView external linksLinks
Mithra Scanner is an interactive API testing tool for prompt injection, refusal detection, and LLM security benchmarking. It supports YAML-based rule definitions, custom refusal lists, REST API integration, and provides detailed CLI output for security testing of language model endpoints.
☆55Sep 9, 2025Updated 5 months ago
Alternatives and similar repositories for Mithra-Scanner
Users that are interested in Mithra-Scanner are comparing it to the libraries listed below
Sorting:
- Inspired by the Tryhackme.com Room "Python for Pentesters"☆10Jun 9, 2024Updated last year
- Unofficial micro-architecture optimized hardened_malloc package☆13Nov 25, 2025Updated 2 months ago
- ☆15Apr 27, 2020Updated 5 years ago
- This is a complete set of HTB academy CBBH path cheatsheets and skills assesment solutions☆10May 10, 2024Updated last year
- WinRemoteEnum is a module-based collection of operations achievable by a low-privileged domain user.☆13Oct 24, 2022Updated 3 years ago
- ☠️ Code for the Hackfest Workshop☆10Oct 12, 2024Updated last year
- ☆12Mar 7, 2025Updated 11 months ago
- Collection of extracted System Prompts from popular chatbots like ChatGPT, Claude & Gemini☆28Jun 1, 2025Updated 8 months ago
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated 10 months ago
- XXE techniques☆14Oct 10, 2021Updated 4 years ago
- Scripts for automating actions in Cobalt Strike☆11Jul 1, 2016Updated 9 years ago
- Random code snippets☆11Oct 27, 2023Updated 2 years ago
- Identify the different types of hashes used to encrypt passwords.☆10Mar 12, 2017Updated 8 years ago
- Hello Hackers ! , Shigaraki tool is all in one for finding specially admin panels , login panels from all subdomains .☆15Jul 1, 2025Updated 7 months ago
- Awesome hacking is an awesome collection of hacking tools.☆12Apr 24, 2019Updated 6 years ago
- ☆16Aug 2, 2025Updated 6 months ago
- Builds an AlmaLinux ISO secured to ANSSI-BP-028 standards.☆13Nov 10, 2023Updated 2 years ago
- ☆14Dec 22, 2020Updated 5 years ago
- Configurable, Community driven, HTTP C2 Profile☆27May 30, 2025Updated 8 months ago
- Powershell Based tool for gathering information related to O365 intrusions and potential Breaches☆17Dec 29, 2024Updated last year
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- Templates for developing your own listeners and agents for AdaptixC2.☆44Feb 3, 2026Updated last week
- ☆17Dec 1, 2019Updated 6 years ago
- ☆12Feb 24, 2022Updated 3 years ago
- Javascript sourcemaps enumeration tool☆15Dec 19, 2024Updated last year
- Yoink is a quick tool for use with Obsidian that will allow you to take a markdown file and package it up into a folder that will allow y…☆15Aug 31, 2023Updated 2 years ago
- demo unhooking functions in ntdll☆28Jul 15, 2025Updated 6 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆25Dec 20, 2025Updated last month
- Brute Ratel External C2 (Microsoft Teams)☆38Dec 11, 2024Updated last year
- ☆16Aug 27, 2025Updated 5 months ago
- Agent part of Hashtopus☆17Oct 8, 2017Updated 8 years ago
- Metagoofil is an information gathering tool designed for extracting metadata of public documents (pdf,doc,xls,ppt,docx,pptx,xlsx) belongi…☆15Apr 6, 2015Updated 10 years ago
- ☆22Apr 11, 2025Updated 10 months ago
- Offline AI Security Assistant for Air-Gapped Pentesting☆55Jan 6, 2026Updated last month
- Proofpoint URL Decoder☆20Oct 25, 2017Updated 8 years ago
- Impacket with added MSSQL Relay server☆49Dec 30, 2025Updated last month
- Obfuscated Powershell Empire 2.x stager that allows for creation of a macro which uses VBA to backdoor .lnk files on the system. This is…☆18Nov 8, 2017Updated 8 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Jun 3, 2016Updated 9 years ago
- ☆22Oct 21, 2024Updated last year