ReversecLabs / llm-vulnerable-recruitment-appLinks
An example vulnerable app that integrates an LLM
☆24Updated last year
Alternatives and similar repositories for llm-vulnerable-recruitment-app
Users that are interested in llm-vulnerable-recruitment-app are comparing it to the libraries listed below
Sorting:
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55Updated 4 months ago
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆134Updated 9 months ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆57Updated 2 months ago
- A fast and comprehensive tool for organizational network scanning☆134Updated last year
- source code for the offsecml framework☆41Updated last year
- Example agents for the Dreadnode platform☆16Updated last month
- Tree of Attacks (TAP) Jailbreaking Implementation☆115Updated last year
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆78Updated 4 months ago
- ☆54Updated this week
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆77Updated this week
- Verizon Burp Extensions: AI Suite☆138Updated 4 months ago
- Tools for attacking Azure Function Apps☆83Updated 10 months ago
- ☆78Updated last year
- ☆17Updated 5 months ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated last year
- ☆17Updated last year
- Reference notes for Attacking and Defending Generative AI presentation☆65Updated last year
- Protection against HTML smuggling attacks.☆99Updated 2 months ago
- using ML models for red teaming☆44Updated 2 years ago
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆77Updated 10 months ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆34Updated last month
- Payloads for Attacking Large Language Models☆99Updated 3 months ago
- Automates the network enumeration process in a fire-and-forget manner, among many more functions. Aims to be the illest Nmap/masscan wrap…☆53Updated 5 months ago
- ☆71Updated last month
- AI-Powered, Local Pythonic Coding Agent 🐞💻☆24Updated 6 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆30Updated last year
- Minimal workflows☆20Updated last year
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆59Updated 5 months ago
- LLM Testing Findings Templates☆72Updated last year
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆67Updated last year