MrMoshkovitz / gandalf-llm-pentesterLinks
Automated red-team toolkit for stress-testing LLM defences - Vector Attacks on LLMs (Gendalf Case Study)
☆104Updated 3 months ago
Alternatives and similar repositories for gandalf-llm-pentester
Users that are interested in gandalf-llm-pentester are comparing it to the libraries listed below
Sorting:
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆375Updated 2 months ago
- ☆233Updated last month
- JWT Auditor – Analyze, break, and understand your tokens like a pro.☆294Updated 3 months ago
- AI for Ethical Hacking - Workshop☆231Updated 3 weeks ago
- ☆128Updated 5 months ago
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.☆154Updated 2 months ago
- API Pentesting Tools are specialized security tools used to test and analyze the security of Application Programming Interfaces (APIs).☆224Updated 7 months ago
- ☆99Updated last month
- Social Engineering Tactics contains real-world social engineering tactics used for manipulation, persuasion, and deception. Stay aware an…☆44Updated 7 months ago
- Darkweb_Crawler - an advanced version of DEEPWEBHARVESTER is a Python-based OSINT (Open-Source Intelligence) tool designed for ethical se…☆42Updated last month
- ☆116Updated last month
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆276Updated 2 weeks ago
- The Most Advanced Client-Side Prototype Pollution Scanner☆241Updated 2 weeks ago
- An archive of 0day.today exploits☆302Updated 3 months ago
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆236Updated last year
- All-in-one offensive security toolbox with AI agent and MCP architecture. Integrates tools like Nmap, Metasploit, FFUF, SQLMap. Enables p…☆462Updated 5 months ago
- ☆19Updated last month
- Analyze Android native `.so` files☆87Updated 3 months ago
- SubOwner - A Simple tool check for subdomain takeovers.☆117Updated last year
- 🤖 LLM-powered agent for automated Google Dorking in bug hunting & pentesting.☆79Updated last week
- Advanced CORS Header Checker Tool with Vulnerability Detection and Bypass Attempts☆66Updated 5 months ago
- The Shodan MCP Server by ADEO Cybersecurity Services provides cybersecurity professionals with streamlined access to Shodan's powerful re…☆16Updated 7 months ago
- Subdomain Enumerator and Simple Crawler☆154Updated 2 months ago
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆203Updated last month
- Physical penetration testing is a critical aspect of security assessment that involves simulating real-world attacks to evaluate the effe…☆82Updated 7 months ago
- GarudRecon automates domain recon with top open-source tools to discover assets, enumerate subdomains, and detect XSS, SQLi, LFI, RCE & m…☆170Updated 3 weeks ago
- A deliberately vulnerable mobile banking application designed for practicing mobile security testing. Features common vulnerabilities fou…☆57Updated 2 months ago
- Search for all leaked keys/secrets using one regex! bugbounty☆142Updated 7 months ago
- Find S3 AWS/GCP/Azure buckets while surfing. S3DNS acts as DNS server, follows CNAMEs and matches any bucket pattern☆110Updated last month
- AI/LLM local model integration for analysis of reconftw results☆84Updated 6 months ago