R1ngZer0 / Packt-Conferences-Put-GenAI-to-WorkLinks
☆11Updated last year
Alternatives and similar repositories for Packt-Conferences-Put-GenAI-to-Work
Users that are interested in Packt-Conferences-Put-GenAI-to-Work are comparing it to the libraries listed below
Sorting:
- Dusseldorf is an out-of-band security tool to help in security research.☆33Updated last week
- An example vulnerable app that integrates an LLM☆21Updated last year
- Docker container for running OWASP WebGoat.NET application☆11Updated 7 years ago
- Application which investigates defensive measures against prompt injection attacks on an LLM, with a focus on the exposure of external to…☆26Updated 7 months ago
- OWASP Foundation Web Respository☆11Updated 3 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆31Updated 3 years ago
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆13Updated last year
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆27Updated 5 months ago
- ☆41Updated 3 months ago
- Secure Jupyter Notebooks and Experimentation Environment☆75Updated 4 months ago
- An ultra lightweight web screenshot tool with advanced DOM analysis features.☆26Updated this week
- ☆27Updated last week
- AWSATT&CK adds MITRE ATT&CK context and additional logging capabilities to Rhino Security Labs's open-source AWS exploitation framework, …☆45Updated 4 years ago
- Create an AMI with CobaltStrike and related tools.☆10Updated 2 weeks ago
- Vovk is framework of tools that include a WinDbg extension that generates in-depth YARA rules for malware.☆22Updated 9 months ago
- ☆34Updated 3 years ago
- CLI tool for interacting with GPT, analyze local files, etc.☆16Updated 2 weeks ago
- A walkthrough of security controls for a serverless architecture via a demo application☆11Updated 3 years ago
- This repository contains generated contextual data utilized by pyattck.☆19Updated 3 months ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16Updated 4 years ago
- ☆59Updated last year
- This repository contains resources and materials for the "Using Retrieval Augmented Generation (RAG), Langchain, and LLMs for Cybersecuri…☆54Updated last week
- A fast port scanner written in go with a focus on reliability and simplicity.☆16Updated 7 months ago
- Public repository to provide guidance and examples for people to start learning IaC. This repository also contains some open-hack style l…☆23Updated last year
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Updated 11 months ago
- ☆15Updated 2 years ago
- Spins up a docker container with several useful tools for offensive security in macOS/cloud environments. Also installs the needed depend…☆17Updated 3 years ago
- OWASP Foundation Web Respository☆10Updated 2 years ago
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆12Updated 3 years ago
- A dataset of global salaries in InfoSec/Cybersecurity.☆20Updated this week