Extensible vulnerable AI Bot to illustrate vulnerabilities in LLM applications.
☆19Jun 17, 2024Updated last year
Alternatives and similar repositories for Professional-Secure-AI-Bot
Users that are interested in Professional-Secure-AI-Bot are comparing it to the libraries listed below
Sorting:
- Autonomous AI C2☆33Jul 23, 2024Updated last year
- ☆13Feb 26, 2021Updated 5 years ago
- A list of all projects by UW CSE students.☆11Feb 8, 2016Updated 10 years ago
- An open source game for cloud natives☆12Aug 30, 2023Updated 2 years ago
- Banned word lists for use with Lithnet Password Protection for Active Directory☆12Jul 10, 2023Updated 2 years ago
- MCP Server for Snyk Security Scanning☆15Feb 23, 2025Updated last year
- ☆13Jul 4, 2023Updated 2 years ago
- ☆10Oct 15, 2019Updated 6 years ago
- An accurated list of things to test while pentesting☆11Jan 2, 2021Updated 5 years ago
- A CLI tool (and library) written in Go to simplify the process of retrieving IP addresses from infrastructure hosted on Google Cloud Plat…☆11Nov 20, 2025Updated 3 months ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- ☆16Dec 7, 2025Updated 2 months ago
- Notes Template/Checklist for PEN-300 OSEP☆16Nov 20, 2021Updated 4 years ago
- An OSINT tool for discovering domains, organizations, and addresses from SSL/TLS certificates using crt.sh. Supports proxy configurations…☆12Jun 18, 2025Updated 8 months ago
- Find unicode codepoints to use in normalisation and transformation attacks.☆11Mar 15, 2021Updated 4 years ago
- Infrastructure-as-code for a serverless knowledge base using Amazon Bedrock, Aurora PostgreSQL (with pgvector), Lambda, and S3. This setu…☆19Mar 23, 2025Updated 11 months ago
- ☆11Jun 7, 2025Updated 8 months ago
- AWS Route53 provider for octoDNS☆11Jan 27, 2026Updated last month
- Run Dockerized web browsers from other operating systems on Linux.☆14Mar 2, 2025Updated 11 months ago
- Vulnerable LLM Application☆14Jan 1, 2024Updated 2 years ago
- The source code of "Deep attention diffusion graph neural networks for text classification"☆13Nov 11, 2023Updated 2 years ago
- Obfuscate any Python with only built-in functions☆14Oct 11, 2025Updated 4 months ago
- Flexible guide to performing code review☆10Jul 17, 2017Updated 8 years ago
- LLM Vulnerable Application☆13Aug 19, 2023Updated 2 years ago
- Security and Privacy Failures in Popular 2FA Apps☆20Oct 5, 2023Updated 2 years ago
- Persist like a Dodder☆67May 19, 2025Updated 9 months ago
- ☆17Jan 9, 2025Updated last year
- ☆11Jan 15, 2018Updated 8 years ago
- A Python script that decodes USB keyboard packet capture hex data.☆13Nov 17, 2021Updated 4 years ago
- macos-collector - Automated Collection of macOS Forensic Artifacts for DFIR☆29Jan 29, 2026Updated 3 weeks ago
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆16Jan 25, 2026Updated last month
- A simple chat app☆16Dec 7, 2022Updated 3 years ago
- Megagrep helps beginning a code review by searching for keywords in the code using "grep". It does not search for vulnerabilities directl…☆15Aug 8, 2022Updated 3 years ago
- dotfiles for vim, bash, git, irb, tmux☆17Aug 27, 2025Updated 6 months ago
- A service container for interacting with SRA's VECTR☆16Apr 9, 2025Updated 10 months ago
- Ref: API-Security-Checklist☆14Mar 31, 2023Updated 2 years ago
- Get vue-router routes config from file system.☆12Oct 26, 2018Updated 7 years ago
- ☆19Dec 18, 2024Updated last year
- Full frontend code for the getrumin.com web app☆16Nov 30, 2021Updated 4 years ago