Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.
☆170Oct 13, 2023Updated 2 years ago
Alternatives and similar repositories for llm-security-101
Users that are interested in llm-security-101 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- LLM Testing Findings Templates☆75Feb 14, 2024Updated 2 years ago
- Burp Suite extension that makes your life easier by tucking the headers out of the way, so you can see the body content right away withou…☆39Oct 23, 2023Updated 2 years ago
- Learn AI security through a series of vulnerable LLM CTF challenges. No sign ups, no cloud fees, run everything locally on your system.☆326Aug 22, 2024Updated last year
- Can Large Language Models Solve Security Challenges? We test LLMs' ability to interact and break out of shell environments using the Over…☆13Aug 21, 2023Updated 2 years ago
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.☆11Apr 27, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆104Apr 22, 2024Updated last year
- Azure and AWS Attacks☆1,113Nov 25, 2022Updated 3 years ago
- A curation of awesome tools, documents and projects about LLM Security.☆1,554Aug 20, 2025Updated 7 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆62Aug 19, 2024Updated last year
- ☆18Mar 26, 2024Updated 2 years ago
- Scripts and misc. stuff related to the PortSwigger Web Academy☆17Feb 6, 2022Updated 4 years ago
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Jun 14, 2024Updated last year
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆21Apr 9, 2025Updated 11 months ago
- Securing LLM's Against Top 10 OWASP Large Language Model Vulnerabilities 2024☆22May 10, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆688Mar 20, 2026Updated last week
- Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.☆1,917Oct 1, 2025Updated 5 months ago
- Gourlex is a simple tool that can be used to extract URLs and paths from web pages.☆247Mar 28, 2024Updated last year
- 📚A curated list of product security resources.☆23Jun 11, 2025Updated 9 months ago
- A OWASP Based Checklist With 80+ Test Cases☆156Oct 26, 2022Updated 3 years ago
- 🤫 husher - Encode text to be hidden from human eyes but visible to LLMs☆12Jan 18, 2024Updated 2 years ago
- ☆244Jan 23, 2025Updated last year
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆36May 29, 2024Updated last year
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆50Jul 8, 2025Updated 8 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆80Nov 18, 2024Updated last year
- A tool designed for penetration testers to perform attacks on LAN and WLAN networks, including network discovery, exploitation, and NAC b…☆45Jul 31, 2025Updated 7 months ago
- This is my personal Enumeration Handbook that I used for the OSCP 2023☆22Aug 21, 2023Updated 2 years ago
- Url scrapper or extractor from alienvault☆38Mar 1, 2025Updated last year
- LLM agent solving traces, leaderboards, and benchmark results across security CTF and hacking platforms☆54Updated this week
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated last year
- This repository contains the best fuzzing wordlist files☆34Dec 2, 2024Updated last year
- Step-by-step guide to building a custom machine for OSINT activities. The Basic Package includes a robust LINUX system strengthening proc…☆129Feb 22, 2024Updated 2 years ago
- Automatically deploy Nemesis☆21Jun 14, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Leak NTLM via Website tab in teams via MS Office☆79Mar 28, 2024Updated last year
- Indirect syscalls + DInvoke made simple.☆95Dec 24, 2024Updated last year
- Collection of all the resources published by Payatu.☆11Aug 11, 2025Updated 7 months ago
- An Incredibly Annoying, Insufferable Authentication Implementation☆31Apr 17, 2024Updated last year
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆27Dec 13, 2022Updated 3 years ago
- ☆207Feb 5, 2025Updated last year
- Intelligence and Reconnaissance Package/Bundle installer.☆28Nov 11, 2020Updated 5 years ago