Reference notes for Attacking and Defending Generative AI presentation
☆70Jul 30, 2024Updated last year
Alternatives and similar repositories for Attacking-and-Defending-Generative-AI
Users that are interested in Attacking-and-Defending-Generative-AI are comparing it to the libraries listed below
Sorting:
- Simple Chatbot for testing AI Red Team tooling☆17Feb 11, 2025Updated last year
- The notebook for my talk - ChatGPT: Your Red Teaming Ally☆54Aug 18, 2023Updated 2 years ago
- alternative to procdump☆11May 26, 2021Updated 4 years ago
- ☆375Jun 25, 2025Updated 8 months ago
- Payloads for Attacking Large Language Models☆127Jan 13, 2026Updated last month
- ☆87Feb 27, 2026Updated last week
- modified mssqlclient from impacket to extract policies from the SCCM database☆44Feb 24, 2026Updated last week
- Sp00fer blog post -☆24Jul 19, 2022Updated 3 years ago
- All things specific to LLM Red Teaming Generative AI☆29Oct 22, 2024Updated last year
- Red Team tool for exfiltrating files from a target's Google Drive that you have access to, via Google's API.☆59Sep 2, 2021Updated 4 years ago
- Autonomous AI C2☆33Jul 23, 2024Updated last year
- AAD related enumeration in Nim☆131Sep 7, 2023Updated 2 years ago
- ☆36Nov 26, 2024Updated last year
- Links to materials referenced in the SANS Tech Tuesday workshop June 30,2020☆29Oct 7, 2020Updated 5 years ago
- Application which investigates defensive measures against prompt injection attacks on an LLM, with a focus on the exposure of external to…☆34Oct 24, 2024Updated last year
- ☆39Jan 10, 2019Updated 7 years ago
- This tool exploits Golden DMSA attack against delegated Managed Service Accounts.☆90Jul 15, 2025Updated 7 months ago
- Slackhound allows red and blue teams to perform fast reconnaissance on Slack workspaces/organizations to quickly search user profiles, lo…☆81Aug 12, 2025Updated 6 months ago
- CSV injection Vulnerable Script.☆29Jun 19, 2017Updated 8 years ago
- ysoserial.net docker image☆29Sep 23, 2024Updated last year
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆154Dec 26, 2025Updated 2 months ago
- SOCKS5 proxy tool that uses Azure Blob Storage as a means of communication.☆309Feb 16, 2026Updated 2 weeks ago
- 'Software Asset Management' PowerShell library to extract software licensing relevant information from enterprise software systems☆13Aug 26, 2020Updated 5 years ago
- Windows Signature Thief is a program designed to steal the digital signature of one file and install it on another.☆21Dec 9, 2025Updated 2 months ago
- Scapy packet fragment reassembly engines☆35Jan 24, 2021Updated 5 years ago
- ☆142Jan 28, 2026Updated last month
- ☆159Apr 4, 2025Updated 11 months ago
- AI-powered bug hunter - vscode plugin.☆37Sep 15, 2024Updated last year
- Solutions for access (APM) related use cases.☆10Apr 19, 2023Updated 2 years ago
- ☆15Jul 31, 2025Updated 7 months ago
- OWASP Threat Dragon core files☆11Jan 26, 2026Updated last month
- CloudGraph managed policy packs☆10May 17, 2023Updated 2 years ago
- Minimalistic lightweight toolbox for secure virtual private networks☆12Mar 30, 2016Updated 9 years ago
- A repo of fake committed secrets to test tools that find committed secrets ([dont submit for BB :-) ]☆10Mar 22, 2018Updated 7 years ago
- Step-by-step guidance for testing Azure Cosmos DB resources using REST API with Postman☆11Sep 21, 2022Updated 3 years ago
- DevSecOps Working Group☆12Sep 24, 2019Updated 6 years ago
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- Integrate PyRIT in existing tools☆55Feb 23, 2026Updated last week
- OpenAI and Power Platform Demo☆11Apr 27, 2023Updated 2 years ago