☆22Dec 16, 2024Updated last year
Alternatives and similar repositories for Open-LLM-Security-Benchmark
Users that are interested in Open-LLM-Security-Benchmark are comparing it to the libraries listed below
Sorting:
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆93Updated this week
- ☆35Feb 6, 2026Updated 3 weeks ago
- In-the-wild deepfake detection dataset☆13Mar 5, 2025Updated 11 months ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆37Jul 11, 2023Updated 2 years ago
- Test LLMs against jailbreaks and unprecedented harms☆40Oct 19, 2024Updated last year
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- OWASP Foundation Web Respository☆12Jan 28, 2026Updated last month
- [USENIX'25] HateBench: Benchmarking Hate Speech Detectors on LLM-Generated Content and Hate Campaigns☆13Mar 1, 2025Updated last year
- A beginners guide to exploiting Buffer Oveflow vulnerabilities using Ollydbg simular to offensive security techniques.☆10May 3, 2019Updated 6 years ago
- ☆12Nov 14, 2025Updated 3 months ago
- Official Implementation of implicit reference attack☆11Oct 16, 2024Updated last year
- OWASP Web Security Testing Guide RAG system with ChromaDB, MCP for Claude Code☆17Dec 11, 2025Updated 2 months ago
- Security Lab☆13Jun 5, 2023Updated 2 years ago
- ☆11Nov 5, 2018Updated 7 years ago
- ☆10Mar 22, 2019Updated 6 years ago
- A tool for extracting, modifying, and crafting ASDM binary packages (CVE-2022-20829)☆13Aug 15, 2022Updated 3 years ago
- Monitor/Archive of Azure IAM (Role Definitions and Provider Operations). Tweets at https://twitter.com/maiam_bot☆10Feb 25, 2026Updated last week
- Code for running forward and backward versions of GPT2☆10Nov 20, 2021Updated 4 years ago
- ☆11Jun 7, 2025Updated 8 months ago
- Search and find all supported Azure Policy Aliases in your browser. Automatically updated every day: https://policyalias.mats.codes/☆15Feb 24, 2026Updated last week
- A PoC that uses the DirSync protocol to poll Active Directory for changes☆13Aug 16, 2020Updated 5 years ago
- Digital Forensics and Incident Response notes and Autopsy tool walkthrough☆11Feb 3, 2022Updated 4 years ago
- ☆43May 22, 2021Updated 4 years ago
- A curated collection of papers and related projects on using LLMs for privacy.☆25Oct 8, 2025Updated 4 months ago
- reducing the entropy of your payload☆11Aug 15, 2022Updated 3 years ago
- A bash script that can scan a target host or a list of target hosts looking for open/closed ports using netcat or telnet.☆13Feb 11, 2023Updated 3 years ago
- ☆22Aug 16, 2025Updated 6 months ago
- A monitoring hub that watches popular open-source repositories and uses AI to detect when commits are patching security vulnerabilities -…☆76Updated this week
- A Cybersecurity Generalist LLM (ICLR'26)☆32Feb 9, 2026Updated 3 weeks ago
- GitHub landing page repo☆12Feb 18, 2026Updated 2 weeks ago
- Code and data for PAN and PAN-phys.☆13Mar 20, 2023Updated 2 years ago
- ☆13Feb 18, 2024Updated 2 years ago
- ☆10Dec 24, 2025Updated 2 months ago
- A script to download and configure all server components of KoBoToolbox for installation on a local machine☆14Aug 28, 2019Updated 6 years ago
- Tampers with Mods to Trigger False-Flag Antivirus Alerts against GTA V Mod Menus on VirusTotal, causing cheaters to disable their mods be…☆12May 14, 2017Updated 8 years ago
- ☆15Mar 12, 2025Updated 11 months ago
- ☆14Mar 5, 2021Updated 4 years ago
- A suite of WiFi/Bluetooth offensive and defensive tools for the ESP32☆13Nov 16, 2023Updated 2 years ago
- So recently, I started off with some basic exploit development, Here is a collection of all the stack overflow exploits I programmed for …☆11Sep 8, 2021Updated 4 years ago