ReversecLabs / llm-vulnerable-recruitment-app
An example vulnerable app that integrates an LLM
☆18Updated last year
Alternatives and similar repositories for llm-vulnerable-recruitment-app
Users that are interested in llm-vulnerable-recruitment-app are comparing it to the libraries listed below
Sorting:
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆41Updated 8 months ago
- Minimal workflows☆19Updated last year
- An interactive CLI application for interacting with authenticated Jupyter instances.☆53Updated last week
- ☆16Updated last year
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆13Updated 4 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated last year
- Developper-proof prevention of SQL injection (java library)☆11Updated 4 years ago
- ☆15Updated last month
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆34Updated last year
- source code for the offsecml framework☆40Updated 11 months ago
- LLM Vulnerable Application☆11Updated last year
- A knowledge source about TTPs used to target GenAI-based systems, copilots and agents☆35Updated 2 months ago
- Automates the network enumeration process in a fire-and-forget manner, among many more functions. Aims to be the illest Nmap/masscan wrap…☆53Updated last month
- Dusseldorf is an out-of-band security tool to help in security research.☆33Updated last week
- API and CLI tool to fetch and query Chome DevTools heap snapshots (Python & Playwright)☆14Updated 11 months ago
- ☆77Updated last year
- CLI and API server for https://github.com/dreadnode/robopages☆31Updated last week
- Configurable, Community driven, HTTP C2 Profile☆17Updated 2 months ago
- AssetViz simplifies the visualization of subdomains from input files, presenting them as a coherent mind map. Ideal for penetration test…☆32Updated last year
- ☆9Updated last month
- Basic brute-force script targeting the standard Keycloak Admin/User Console browser login flow.☆19Updated last month
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆19Updated last year
- using ML models for red teaming☆43Updated last year
- ☆11Updated 9 months ago
- A utility for recursively traversing SSL/TLS certificates for collecting DNS names☆46Updated last year
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 9 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆46Updated 2 months ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆27Updated last month
- Tool for scanning domains for .git directories.☆16Updated last year
- MalDev & AV-EDR Evasion for Pentesters☆15Updated 2 years ago