AI / LLM Red Team Field Manual & Consultant’s Handbook
☆253Feb 3, 2026Updated 2 months ago
Alternatives and similar repositories for ai-llm-red-team-handbook
Users that are interested in ai-llm-red-team-handbook are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- OWASP Web Security Testing Guide RAG system with ChromaDB, MCP for Claude Code☆20Dec 11, 2025Updated 4 months ago
- SpicyAD is a C# Active Directory penetration testing tool designed for authorized security assessments. It combines multiple AD attack te…☆101Dec 23, 2025Updated 4 months ago
- A beginner-friendly collection of Rust notes focused on Red Team Tooling • Malware Development • Systems Programming • Rust Fundamentals☆61Nov 24, 2025Updated 5 months ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆167Oct 21, 2025Updated 6 months ago
- Indirect-Shellcode-Executor expoits the miss-configuration/vulnerability present on the API Windows method ReadProcessMemory discovered b…☆85Nov 15, 2025Updated 5 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Using Chromium-based browsers as a proxy for C2 traffic.☆152Dec 6, 2025Updated 4 months ago
- This is my starred repositories including the description for each tool. Makes search/filter over them easier.☆64Feb 26, 2025Updated last year
- What's the Red Team doing to my Linux Box? - BSides Vienna 2024☆16Nov 23, 2024Updated last year
- A no-reboot, in-memory Linux persistence PoC leveraging namespace joining, user-namespace elevation, and self‑deletion.☆65Aug 6, 2025Updated 8 months ago
- Nim implementation for sud0Ru's Credential Dumping from SAM/SECURITY Hives Method (a.k.a. SilentHarvest)☆104Apr 4, 2026Updated 3 weeks ago
- proper ntdll .text section unhooking via native api. unlike other unhookers this doesnt leave 2 ntdlls loaded. x86/x64/wow64 supported.☆56Dec 9, 2025Updated 4 months ago
- This repository is for the Testing ASP.NET ViewState with YSoNet (YSoSerial.NET) workshop.☆24Dec 17, 2025Updated 4 months ago
- Carving tool based in Radare2 & Yara☆17Oct 30, 2018Updated 7 years ago
- POC For CVE-2022-24483☆15Apr 12, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- EvilMist is a collection of scripts and utilities designed to support cloud penetration testing & red teaming. The toolkit helps identify…☆129Feb 25, 2026Updated 2 months ago
- .NET assembly loader with patching AMSI and ETW bypass☆33Apr 16, 2025Updated last year
- ☆78Jan 1, 2026Updated 4 months ago
- PentestAgent is an AI agent framework for black-box security testing, supporting bug bounty, red-team, and penetration testing workflows.☆2,177Updated this week
- Source code for https://makemydrive.fun☆11Nov 13, 2017Updated 8 years ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆21Apr 13, 2026Updated 2 weeks ago
- ☆52Mar 30, 2026Updated last month
- Location of some Active Directory lab scripts I have created and find useful☆114Feb 2, 2026Updated 2 months ago
- Create local administrators with the SAMR API (lowest-level technique). Implemented in C#, Crystal, Python and Rust☆65Mar 7, 2026Updated last month
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A meta-list of public references to threat actor profiles and APT group datasets.☆80Oct 2, 2025Updated 7 months ago
- Phantom Keylogger is an advanced, stealth-enabled keystroke and visual intelligence gathering system.☆77Dec 10, 2025Updated 4 months ago
- Linux post exploitation tool for info gathering and exfiltration 🐧📡💀☆94Nov 13, 2025Updated 5 months ago
- A structured portfolio of weekly CEH v13 assessments, vulnerability labs, and ethical hacking documentation to demonstrate practical cybe…☆23Jun 25, 2025Updated 10 months ago
- AI 生成☆49Jul 30, 2025Updated 9 months ago
- PowerShell SharePoint extraction + auditing tool for red/blue/purple teams. Enumerates all SharePoint sites/drives a user can access via …☆155Jan 25, 2026Updated 3 months ago
- Exploit iDRAC 7 & 8 firmware < 2.52.52.52☆18Dec 10, 2021Updated 4 years ago
- Dominate the Active Directory game. An Active Directory environments pentest tool complementary to existing ones like NetExec.☆19Updated this week
- AI Red Teaming playground labs to run AI Red Teaming trainings including infrastructure.☆1,919Feb 13, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- OSINT license plate data by scraping lookup site(s)☆13Apr 2, 2023Updated 3 years ago
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.☆102Jan 10, 2026Updated 3 months ago
- Crystal Palace library for proxying Nt API calls via the Threadpool. Updated for call gadgets.☆20Nov 11, 2025Updated 5 months ago
- SharePoint WebPart Injection Exploit Tool☆312Nov 28, 2025Updated 5 months ago
- An introduction to detection engineering☆14Jan 3, 2025Updated last year
- Network penetration testing toolset wrapper☆81Jul 5, 2022Updated 3 years ago
- Repository for the work of the CoSAI Technical Steering Committee (TSC)☆21Apr 24, 2026Updated last week