Mithra Scanner is an interactive API testing tool for prompt injection, refusal detection, and LLM security benchmarking. It supports YAML-based rule definitions, custom refusal lists, REST API integration, and provides detailed CLI output for security testing of language model endpoints.
☆53Sep 9, 2025Updated 5 months ago
Alternatives and similar repositories for Mithra-Scanner
Users that are interested in Mithra-Scanner are comparing it to the libraries listed below
Sorting:
- Inspired by the Tryhackme.com Room "Python for Pentesters"☆10Jun 9, 2024Updated last year
- WinRemoteEnum is a module-based collection of operations achievable by a low-privileged domain user.☆13Oct 24, 2022Updated 3 years ago
- This is a complete set of HTB academy CBBH path cheatsheets and skills assesment solutions☆10May 10, 2024Updated last year
- Unofficial micro-architecture optimized hardened_malloc package☆13Updated this week
- ☆15Apr 27, 2020Updated 5 years ago
- Keep Your Sandbox Tight! – Actually just a collection of my own tight sandbox configurations.☆16Jan 22, 2025Updated last year
- ☆12Mar 7, 2025Updated 11 months ago
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated 11 months ago
- XXE techniques☆14Oct 10, 2021Updated 4 years ago
- Scripts for automating actions in Cobalt Strike☆11Jul 1, 2016Updated 9 years ago
- Random code snippets☆11Oct 27, 2023Updated 2 years ago
- Awesome hacking is an awesome collection of hacking tools.☆14Apr 24, 2019Updated 6 years ago
- ☆14Nov 18, 2021Updated 4 years ago
- my GNU/Linux configuration files☆13Mar 2, 2024Updated 2 years ago
- Automatic Enumeration is a command line utility that automatically tries to collect and retrieve various pieces of information from a tar…☆15Apr 21, 2025Updated 10 months ago
- The great TCP Gender Changer (tgcd) tool compiled for Windows☆14Apr 18, 2016Updated 9 years ago
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- Powershell Based tool for gathering information related to O365 intrusions and potential Breaches☆17Dec 29, 2024Updated last year
- DLL Malware for Signal Desktop. Now utilizes missing dbghelp.dll since Signal patched cryptbase.☆14Jan 24, 2025Updated last year
- Configurable, Community driven, HTTP C2 Profile☆27Feb 16, 2026Updated 2 weeks ago
- demo unhooking functions in ntdll☆28Jul 15, 2025Updated 7 months ago
- Javascript sourcemaps enumeration tool☆15Dec 19, 2024Updated last year
- ☆17Dec 1, 2019Updated 6 years ago
- Templates for developing your own listeners and agents for AdaptixC2.☆45Updated this week
- ☆12Feb 24, 2022Updated 4 years ago
- strongSwan setup for iOS and OS X☆13Aug 6, 2015Updated 10 years ago
- Yoink is a quick tool for use with Obsidian that will allow you to take a markdown file and package it up into a folder that will allow y…☆16Aug 31, 2023Updated 2 years ago
- ☆16Aug 27, 2025Updated 6 months ago
- ☆27Sep 5, 2025Updated 6 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆27Dec 20, 2025Updated 2 months ago
- ☆22Apr 11, 2025Updated 10 months ago
- Impacket☆49Feb 25, 2026Updated last week
- ☆21Nov 6, 2024Updated last year
- Obfuscated Powershell Empire 2.x stager that allows for creation of a macro which uses VBA to backdoor .lnk files on the system. This is…☆18Nov 8, 2017Updated 8 years ago
- Lite version of my Gatekeeper backdoor for public use.☆52Nov 15, 2021Updated 4 years ago
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆50Oct 20, 2025Updated 4 months ago
- C++ tool and library for converting .bin files to shellcode in multiple output formats.☆33Aug 18, 2025Updated 6 months ago
- Lightweight client for testing and documenting API's☆22Updated this week
- ☆21Jul 26, 2022Updated 3 years ago