This project is a deliberately vulnerable environment to learn about LLM-specific risks based on the OWASP Top 10 for LLM Applications.
☆52Jan 19, 2026Updated 2 months ago
Alternatives and similar repositories for LLMGoat
Users that are interested in LLMGoat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Attack/Defense services for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆14Oct 24, 2024Updated last year
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆32Sep 15, 2025Updated 6 months ago
- Prevent in-process process termination by patching exit APIs☆65Nov 9, 2025Updated 5 months ago
- ☆17Jan 9, 2025Updated last year
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- This repo contains the codes for the experiments of the paper "AutoPenBench: Benchmarking Generative Agents for Penetration Testing".☆14Oct 28, 2025Updated 5 months ago
- Using call gadgets to break the call stack signature used by Elastic on proxying a module load. Provided as a Crystal Palace shared libra…☆81Nov 6, 2025Updated 5 months ago
- EternalBlue/DoublePulsar python wrapper☆10Nov 22, 2017Updated 8 years ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago
- Automated discovery and exploitation of security vulnerabilities using natural language and LLMs.☆20Feb 27, 2026Updated last month
- Fast Windows post-exploitation wins after initial access.☆29Jan 28, 2026Updated 2 months ago
- Self-mutating macOS implant☆129Mar 16, 2026Updated 3 weeks ago
- String obfuscator based on the Mealy automata☆13Sep 16, 2017Updated 8 years ago
- This is a working copy of the OWASP Project Handbook and is the draft where changes are made before publishing a final version on the OWA…☆19Feb 22, 2017Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Dump Teams conversations☆18Jun 9, 2021Updated 4 years ago
- LFIter2 Local File Include (LFI) Tool - Auto File Extractor & Username Bruteforcer☆16Nov 11, 2016Updated 9 years ago
- RFID OCPP RaspberryPi☆10Aug 19, 2017Updated 8 years ago
- C2-agnostic BOF collection, categorized by attack chain phase. Designed to be small and modular, allowing for quick execution and automat…☆281Mar 27, 2026Updated last week
- Attack chain emulator. Write recipes for initial access easily☆22Feb 26, 2025Updated last year
- Source code of "TRAP: Targeted Random Adversarial Prompt Honeypot for Black-Box Identification", ACL2024 (findings)☆14Nov 20, 2024Updated last year
- BOF and C++ implementation of the Windows Defender sandboxing technique described by Elastic Security Labs/Gabriel Landau.☆25Jul 5, 2023Updated 2 years ago
- A tool that acts as an assistant for Reverse Engineering challenges in CTFs☆16Jan 5, 2021Updated 5 years ago
- Dummy services for an A/D CTF☆10May 25, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- C# loader that copies a chunk at the time of the shellcode in memory, rather that all at once☆23Jul 14, 2022Updated 3 years ago
- DeVAIC (Detection of Vulnerabilities in AI-generated Code) is a static code analyzer for security issues in Python code snippets. It dete…☆16Oct 24, 2025Updated 5 months ago
- ☆10Oct 13, 2020Updated 5 years ago
- ☆26Mar 10, 2022Updated 4 years ago
- Panoptes Endpoint Detection and Response Solution☆42Mar 7, 2026Updated last month
- Some minor changes to Chimichurri to get it to compile on modern machines☆44Jun 22, 2015Updated 10 years ago
- vm_str.hpp is a header only string obfuscator.☆111Aug 24, 2025Updated 7 months ago
- Powerful LLM Query Framework with YAML Prompt Templates. Made for Automation☆34Sep 20, 2025Updated 6 months ago
- Exploits Oracle 9i XDB ftp password buffer overflow vulnerability☆11Jun 27, 2015Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆13Jun 26, 2022Updated 3 years ago
- Proxy Unix applications in the terminal☆116Apr 14, 2021Updated 4 years ago
- Linux CS bypass technique☆33Feb 4, 2025Updated last year
- Various tools, scripts, and techniques☆19May 13, 2020Updated 5 years ago
- POC script for the ManageEngine Multiple Products Authenticated File Upload Exploit☆13Jun 26, 2017Updated 8 years ago
- All about llm-agents security,attack,vulnerabilities and how to do them for cybersecurity.☆47Dec 28, 2025Updated 3 months ago
- ☆31Jul 26, 2024Updated last year