Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"
☆16Apr 10, 2025Updated last year
Alternatives and similar repositories for LLM-PD
Users that are interested in LLM-PD are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Feb 2, 2026Updated 2 months ago
- ☆18Jul 30, 2024Updated last year
- Find what egress ports are allowed☆47Nov 19, 2025Updated 5 months ago
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated last year
- Unauthenticated enumeration of AWS IAM Roles.☆26Apr 18, 2026Updated last week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- SprayShark is a modular G-Suite password sprayer with threading!☆58May 17, 2025Updated 11 months ago
- Autonomous AI C2☆32Jul 23, 2024Updated last year
- Proof-of-concept modular implant platform leveraging v8☆55Mar 4, 2025Updated last year
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆62Feb 5, 2025Updated last year
- One Conference 2024☆110Oct 1, 2024Updated last year
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 9 months ago
- A security-first linter for code that shouldn't need linting☆18Sep 12, 2023Updated 2 years ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆52Mar 10, 2025Updated last year
- ☆12Jun 19, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆29Dec 26, 2025Updated 4 months ago
- 🤖🛡️🔍🔒🔑 Tiny package designed to support red teams and penetration testers in exploiting large language model AI solutions.☆26May 16, 2024Updated last year
- This repository includes code for the paper "Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networ…☆14Mar 5, 2025Updated last year
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆102Updated this week
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆19Mar 3, 2022Updated 4 years ago
- WAF Exploitation Framework☆13Aug 25, 2023Updated 2 years ago
- Addon for BHCE☆57Apr 1, 2025Updated last year
- A CLI tool (and library) written in Go to simplify the process of retrieving IP addresses from infrastructure hosted on Google Cloud Plat…☆11Updated this week
- MCP server for scanning and remediating hardcoded secrets using GitGuardian’s API. Detect over 500 secret types and prevent credential le…☆35Updated this week
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆30Nov 30, 2025Updated 5 months ago
- 📍 Visualize Flipper Zero recordings on an interacitve map in your browser.☆34Apr 9, 2026Updated 3 weeks ago
- 口诀生成器、顺口溜生成器,辅助记忆背诵。关键词的词头按照词义重组。☆14Mar 28, 2025Updated last year
- ☆10Aug 27, 2022Updated 3 years ago
- This repository contains an IDA processor for loading and disassembling compiled yara rules.☆52Dec 31, 2024Updated last year
- This approach of Intrusion Detection uses two GPT models, which are trained on normal network traffic, to predict sequences of communicat…☆11Oct 3, 2023Updated 2 years ago
- The WiFi IR Blaster is designed to connect all of your old, legacy IR-controlled devices to a WiFi network -- exposing them to a new meth…☆10Dec 6, 2018Updated 7 years ago
- 根据语法规则生成模拟句子