NullTrace-Security / Exploiting-AI
This class is a broad overview and dive into Exploiting AI and the different attacks that exist, and best practice strategies.
☆46Updated this week
Alternatives and similar repositories for Exploiting-AI:
Users that are interested in Exploiting-AI are comparing it to the libraries listed below
- WifiForge is a tool developed by Black Hills InfoSec to help train Pentesters on different Wi-Fi attack vectors and Wireless capabilities…☆284Updated last week
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆189Updated 9 months ago
- Scripts for rapid Windows endpoint "tactical triage" and investigations with Velociraptor and KAPE☆123Updated 3 weeks ago
- Windows Malware Investigation Scripts & Docs☆81Updated 5 months ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆196Updated 9 months ago
- List of tools and resources for pentesting Microsoft Active Directory☆49Updated 3 weeks ago
- M365/Azure adversary simulation tool that generates realistic attack telemetry to help blue teams improve their detection and response ca…☆284Updated last month
- Repository for sharing examples of our artifacts data and for use in new analyst recruitment.☆90Updated last week
- ☆34Updated last month
- ☆58Updated 3 years ago
- Create lab environment for Linux Command Line course☆46Updated 7 months ago
- A collection of CVEs weaponized by ransomware operators☆112Updated this week
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆234Updated last month
- ☆102Updated 2 weeks ago
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆137Updated 3 weeks ago
- AD Lab Setup Scripts☆65Updated last week
- Tools for simulating threats☆183Updated last year
- Halberd : Multi-Cloud Attack Platform☆269Updated last week
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆59Updated 3 months ago
- /dev/tty☆27Updated 2 weeks ago
- Intro Labs Remastered☆32Updated last month
- Tools to automatically create a SANS index based off the course pdf files.☆96Updated 4 years ago
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆237Updated last month
- Completely Risky Active-Directory Simulation Hub☆99Updated last year
- Backdoors & Breaches: Campaigns. These are short guides to help Incident Captains by giving them game ideas based on actual breaches.☆34Updated last year
- Open Source Security Operations Center Documentation☆176Updated this week
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆239Updated last month
- A collection of companies that disclose adversary TTPs after they have been breached☆244Updated 11 months ago
- ☆9Updated 10 months ago
- PowerShell tools to help defenders hunt smarter, hunt harder.☆354Updated last week