This project is a deliberately vulnerable environment to learn about LLM-specific risks based on the OWASP Top 10 for LLM Applications.
☆51Jan 19, 2026Updated 3 months ago
Alternatives and similar repositories for LLMGoat
Users that are interested in LLMGoat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Attack/Defense services for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆14Oct 24, 2024Updated last year
- ☆16Jan 9, 2025Updated last year
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- Using call gadgets to break the call stack signature used by Elastic on proxying a module load. Provided as a Crystal Palace shared libra…☆83Nov 6, 2025Updated 5 months ago
- This repo contains the codes for the experiments of the paper "AutoPenBench: Benchmarking Generative Agents for Penetration Testing".☆15Oct 28, 2025Updated 6 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- EternalBlue/DoublePulsar python wrapper☆10Nov 22, 2017Updated 8 years ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago
- Fast Windows post-exploitation wins after initial access.☆29Jan 28, 2026Updated 3 months ago
- A deliberately insecure Java web application☆44Oct 23, 2025Updated 6 months ago
- Automated discovery and exploitation of security vulnerabilities using natural language and LLMs.☆21Feb 27, 2026Updated 2 months ago
- Self-mutating macOS implant☆129Apr 18, 2026Updated last week
- String obfuscator based on the Mealy automata☆13Sep 16, 2017Updated 8 years ago
- Dump Teams conversations☆18Jun 9, 2021Updated 4 years ago
- LFIter2 Local File Include (LFI) Tool - Auto File Extractor & Username Bruteforcer☆16Nov 11, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- RFID OCPP RaspberryPi☆10Aug 19, 2017Updated 8 years ago
- C2-agnostic BOF collection, categorized by attack chain phase. Designed to be small and modular, allowing for quick execution and automat…☆289Apr 8, 2026Updated 3 weeks ago
- Attack chain emulator. Write recipes for initial access easily☆23Feb 26, 2025Updated last year
- BOF and C++ implementation of the Windows Defender sandboxing technique described by Elastic Security Labs/Gabriel Landau.☆25Jul 5, 2023Updated 2 years ago
- A tool that acts as an assistant for Reverse Engineering challenges in CTFs☆16Jan 5, 2021Updated 5 years ago
- C# loader that copies a chunk at the time of the shellcode in memory, rather that all at once☆23Jul 14, 2022Updated 3 years ago
- DeVAIC (Detection of Vulnerabilities in AI-generated Code) is a static code analyzer for security issues in Python code snippets. It dete…☆18Oct 24, 2025Updated 6 months ago
- Attack/Defense services for the CyberChallenge.IT 2024 National Competition @ Turin, Italy☆13Jul 18, 2024Updated last year
- ☆10Oct 13, 2020Updated 5 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆26Mar 10, 2022Updated 4 years ago
- vm_str.hpp is a header only string obfuscator.☆113Aug 24, 2025Updated 8 months ago
- Some minor changes to Chimichurri to get it to compile on modern machines☆44Jun 22, 2015Updated 10 years ago
- Powerful LLM Query Framework with YAML Prompt Templates. Made for Automation☆34Sep 20, 2025Updated 7 months ago
- Cloak, Honey, Trap: Proactive Defenses Against LLM Agents☆21Jul 9, 2025Updated 9 months ago
- Exploits Oracle 9i XDB ftp password buffer overflow vulnerability☆11Jun 27, 2015Updated 10 years ago
- An AI agent to use Ghidra with any AI.☆27Mar 31, 2025Updated last year
- ☆13Jun 26, 2022Updated 3 years ago
- Proxy Unix applications in the terminal☆116Apr 14, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Linux CS bypass technique☆33Feb 4, 2025Updated last year
- Generatore di rumore scimmiesco in contesto di gare A/D☆11Jul 7, 2023Updated 2 years ago
- Various tools, scripts, and techniques☆19May 13, 2020Updated 5 years ago
- POC script for the ManageEngine Multiple Products Authenticated File Upload Exploit☆13Jun 26, 2017Updated 8 years ago
- ☆31Jul 26, 2024Updated last year
- A simple API to retrieve screenshots of webpages stored on the Wayback Machine.☆11Jul 9, 2022Updated 3 years ago
- All about llm-agents security,attack,vulnerabilities and how to do them for cybersecurity.☆48Apr 8, 2026Updated 3 weeks ago