NullTrace-Security / Exploiting-AI
This class is a broad overview and dive into Exploiting AI and the different attacks that exist, and best practice strategies.
☆50Updated this week
Alternatives and similar repositories for Exploiting-AI
Users that are interested in Exploiting-AI are comparing it to the libraries listed below
Sorting:
- List of tools and resources for pentesting Microsoft Active Directory☆69Updated last week
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆189Updated 10 months ago
- AD Lab Setup Scripts☆72Updated this week
- WifiForge is a tool developed by Black Hills InfoSec to help train Pentesters on different Wi-Fi attack vectors and Wireless capabilities…☆293Updated this week
- Windows Malware Investigation Scripts & Docs☆82Updated 6 months ago
- Scripts for rapid Windows endpoint "tactical triage" and investigations with Velociraptor and KAPE☆123Updated 2 weeks ago
- M365/Azure adversary simulation tool that generates realistic attack telemetry to help blue teams improve their detection and response ca…☆292Updated 2 months ago
- ☆36Updated last month
- Intro Labs Remastered☆32Updated 2 months ago
- Tools for simulating threats☆183Updated last year
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆251Updated last week
- Halberd : Multi-Cloud Attack Tool☆273Updated this week
- Create lab environment for Linux Command Line course☆46Updated 7 months ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆196Updated 10 months ago
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboard☆78Updated 2 months ago
- Security Operations Chef☆28Updated last week
- TCM PEH Course AD Lab Build Script (Hydra-DC, Punisher-Workstation, Spiderman-Workstation)☆143Updated last year
- Knowledge base on cybercriminal concealment techniques☆64Updated last week
- A collection of companies that disclose adversary TTPs after they have been breached☆243Updated last year
- A collection of CVEs weaponized by ransomware operators☆114Updated last week
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆60Updated 3 months ago
- ☆48Updated last week
- Completely Risky Active-Directory Simulation Hub☆100Updated last year
- Repository for sharing examples of our artifacts data and for use in new analyst recruitment.☆98Updated 3 weeks ago
- Open Source Security Operations Center Documentation☆180Updated last week
- Knowledge Management for Offensive Security Professionals Official Repository☆141Updated 2 months ago
- ☆16Updated 7 months ago
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆243Updated 3 weeks ago
- Mapping of open-source detection rules and atomic tests.☆163Updated 3 months ago
- /dev/tty☆27Updated last week