ReversecLabs / llm-vulnerable-recruitment-appLinks
An example vulnerable app that integrates an LLM
☆24Updated last year
Alternatives and similar repositories for llm-vulnerable-recruitment-app
Users that are interested in llm-vulnerable-recruitment-app are comparing it to the libraries listed below
Sorting:
- An interactive CLI application for interacting with authenticated Jupyter instances.☆54Updated 3 months ago
- ☆17Updated 4 months ago
- ☆52Updated 2 weeks ago
- AI-Powered, Local Pythonic Coding Agent 🐞💻☆24Updated 5 months ago
- source code for the offsecml framework☆41Updated last year
- A fast and comprehensive tool for organizational network scanning☆133Updated last year
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆78Updated 3 months ago
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆74Updated this week
- Protection against HTML smuggling attacks.☆97Updated last month
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆56Updated last month
- Verizon Burp Extensions: AI Suite☆137Updated 4 months ago
- ☆78Updated last year
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated last year
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆77Updated 10 months ago
- Automates the network enumeration process in a fire-and-forget manner, among many more functions. Aims to be the illest Nmap/masscan wrap…☆53Updated 4 months ago
- Tools for attacking Azure Function Apps☆83Updated 10 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated last year
- Example agents for the Dreadnode platform☆16Updated last month
- ☆17Updated last year
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆48Updated 4 months ago
- LLM Testing Findings Templates☆72Updated last year
- ☆67Updated 2 weeks ago
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆131Updated 8 months ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆34Updated 3 weeks ago
- ☆37Updated 9 months ago
- Payloads for Attacking Large Language Models☆96Updated 2 months ago
- Application which investigates defensive measures against prompt injection attacks on an LLM, with a focus on the exposure of external to…☆32Updated 10 months ago
- using ML models for red teaming☆44Updated 2 years ago
- A Nemesis powered Retrieval-Augmented Generation (RAG) chatbot proof-of-concept.☆68Updated 3 weeks ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Updated last year