This project is a deliberately vulnerable environment to learn about LLM-specific risks based on the OWASP Top 10 for LLM Applications.
☆52Jan 19, 2026Updated 2 months ago
Alternatives and similar repositories for LLMGoat
Users that are interested in LLMGoat are comparing it to the libraries listed below
Sorting:
- Attack/Defense services for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆14Oct 24, 2024Updated last year
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆33Sep 15, 2025Updated 6 months ago
- Prevent in-process process termination by patching exit APIs☆65Nov 9, 2025Updated 4 months ago
- ☆17Jan 9, 2025Updated last year
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- Using call gadgets to break the call stack signature used by Elastic on proxying a module load. Provided as a Crystal Palace shared libra…☆81Nov 6, 2025Updated 4 months ago
- EternalBlue/DoublePulsar python wrapper☆10Nov 22, 2017Updated 8 years ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago
- Automated discovery and exploitation of security vulnerabilities using natural language and LLMs.☆20Feb 27, 2026Updated 2 weeks ago
- Self-mutating macOS implant☆125Updated this week
- Fast Windows post-exploitation wins after initial access.☆29Jan 28, 2026Updated last month
- String obfuscator based on the Mealy automata☆13Sep 16, 2017Updated 8 years ago
- Dump Teams conversations☆18Jun 9, 2021Updated 4 years ago
- LFIter2 Local File Include (LFI) Tool - Auto File Extractor & Username Bruteforcer☆16Nov 11, 2016Updated 9 years ago
- RFID OCPP RaspberryPi☆10Aug 19, 2017Updated 8 years ago
- Attack chain emulator. Write recipes for initial access easily☆23Feb 26, 2025Updated last year
- Source code of "TRAP: Targeted Random Adversarial Prompt Honeypot for Black-Box Identification", ACL2024 (findings)☆14Nov 20, 2024Updated last year
- BOF and C++ implementation of the Windows Defender sandboxing technique described by Elastic Security Labs/Gabriel Landau.☆24Jul 5, 2023Updated 2 years ago
- Code for the paper "AICrypto: A Comprehensive Benchmark for Evaluating Cryptography Capabilities of Large Language Models"☆29Sep 27, 2025Updated 5 months ago
- A tool that acts as an assistant for Reverse Engineering challenges in CTFs☆16Jan 5, 2021Updated 5 years ago
- Dummy services for an A/D CTF☆10May 25, 2023Updated 2 years ago
- C# loader that copies a chunk at the time of the shellcode in memory, rather that all at once☆23Jul 14, 2022Updated 3 years ago
- DeVAIC (Detection of Vulnerabilities in AI-generated Code) is a static code analyzer for security issues in Python code snippets. It dete…☆15Oct 24, 2025Updated 4 months ago
- ☆10Oct 13, 2020Updated 5 years ago
- vm_str.hpp is a header only string obfuscator.☆108Aug 24, 2025Updated 6 months ago
- Panoptes Endpoint Detection and Response Solution☆43Mar 7, 2026Updated last week
- Cloak, Honey, Trap: Proactive Defenses Against LLM Agents☆17Jul 9, 2025Updated 8 months ago
- Some minor changes to Chimichurri to get it to compile on modern machines☆44Jun 22, 2015Updated 10 years ago
- Powerful LLM Query Framework with YAML Prompt Templates. Made for Automation☆34Sep 20, 2025Updated 5 months ago
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- An AI agent to use Ghidra with any AI.☆24Mar 31, 2025Updated 11 months ago
- ☆13Jun 26, 2022Updated 3 years ago
- Proxy Unix applications in the terminal☆116Apr 14, 2021Updated 4 years ago
- Generatore di rumore scimmiesco in contesto di gare A/D☆11Jul 7, 2023Updated 2 years ago
- Various tools, scripts, and techniques☆19May 13, 2020Updated 5 years ago
- POC script for the ManageEngine Multiple Products Authenticated File Upload Exploit☆13Jun 26, 2017Updated 8 years ago
- All about llm-agents security,attack,vulnerabilities and how to do them for cybersecurity.☆47Dec 28, 2025Updated 2 months ago
- ☆31Jul 26, 2024Updated last year
- Caesar-Cipher based encryption☆29Mar 1, 2021Updated 5 years ago