Shiva108 / ai-llm-red-team-handbookView external linksLinks
AI / LLM Red Team Field Manual & Consultant’s Handbook
☆232Feb 3, 2026Updated 2 weeks ago
Alternatives and similar repositories for ai-llm-red-team-handbook
Users that are interested in ai-llm-red-team-handbook are comparing it to the libraries listed below
Sorting:
- A beginner-friendly collection of Rust notes focused on Red Team Tooling • Malware Development • Systems Programming • Rust Fundamentals☆58Nov 24, 2025Updated 2 months ago
- SpicyAD is a C# Active Directory penetration testing tool designed for authorized security assessments. It combines multiple AD attack te…☆97Dec 23, 2025Updated last month
- ☆58Dec 10, 2025Updated 2 months ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆164Oct 21, 2025Updated 3 months ago
- What's the Red Team doing to my Linux Box? - BSides Vienna 2024☆17Nov 23, 2024Updated last year
- EvilMist is a collection of scripts and utilities designed to support cloud penetration testing & red teaming. The toolkit helps identify…☆96Feb 4, 2026Updated last week
- Using Chromium-based browsers as a proxy for C2 traffic.☆141Dec 6, 2025Updated 2 months ago
- A no-reboot, in-memory Linux persistence PoC leveraging namespace joining, user-namespace elevation, and self‑deletion.☆65Aug 6, 2025Updated 6 months ago
- poc for cve-2025-53772☆46Dec 10, 2025Updated 2 months ago
- OWASP Web Security Testing Guide RAG system with ChromaDB, MCP for Claude Code☆17Dec 11, 2025Updated 2 months ago
- Exhaustive search and flexible filtering of Active Directory ACEs.☆73Nov 10, 2025Updated 3 months ago
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.☆101Jan 10, 2026Updated last month
- PowerShell SharePoint extraction + auditing tool for red/blue/purple teams. Enumerates all SharePoint sites/drives a user can access via …☆98Jan 25, 2026Updated 3 weeks ago
- ☆75Jan 1, 2026Updated last month
- A testing Red Team Infrastructure created with Docker☆32Apr 5, 2022Updated 3 years ago
- HackAgent is an open-source security toolkit to detect vulnerabilities of your AI Agents☆36Updated this week
- Indirect-Shellcode-Executor expoits the miss-configuration/vulnerability present on the API Windows method ReadProcessMemory discovered b…☆82Nov 15, 2025Updated 3 months ago
- Location of some Active Directory lab scripts I have created and find useful☆109Feb 2, 2026Updated 2 weeks ago
- PentestAgent is an AI agent framework for black-box security testing, supporting bug bounty, red-team, and penetration testing workflows.☆1,548Updated this week
- Linux post exploitation tool for info gathering and exfiltration 🐧📡💀☆91Nov 13, 2025Updated 3 months ago
- An introduction to detection engineering☆13Jan 3, 2025Updated last year
- Backdoor that leverages Nmap with setuid permissions to execute commands as root through a Lua-loaded C library☆51Oct 28, 2025Updated 3 months ago
- Create local administrators with the SAMR API (lowest-level technique). Implemented in C#, Python, Rust and Crystal☆52Jan 27, 2026Updated 3 weeks ago
- A Python script to find tenant id an region from a list of domain names.☆16Jan 31, 2025Updated last year
- Another vulnerability scanner☆18Aug 9, 2025Updated 6 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆25Dec 20, 2025Updated last month
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆21Apr 9, 2025Updated 10 months ago
- Elasticsearch Stack Overflow Vulnerability☆18Sep 23, 2023Updated 2 years ago
- A C# tool for extracting information from SCCM PXE boot media.☆45Jan 14, 2026Updated last month
- CVE-2023-50254: PoC Exploit for Deepin-reader RCE that affects unpatched Deepin Linux Desktops. Deepin Linux's default document reader "d…☆16Dec 22, 2023Updated 2 years ago
- Smilex-Eye is a high-speed, advanced OSINT suite that bridges the gap between raw global internet data and actionable security intelligen…☆34Jan 4, 2026Updated last month
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,036Jan 11, 2026Updated last month
- A meta-list of public references to threat actor profiles and APT group datasets.☆75Oct 2, 2025Updated 4 months ago
- Detection of indirect syscall techniques using hardware breakpoints and vectored exception handling.☆51Oct 19, 2025Updated 3 months ago
- Bare Knuckled AV Breaking☆58Aug 30, 2018Updated 7 years ago
- A small guide on Unknown/Orphaned SIDs and some PowerShell tools to help you get rid of them.☆20Mar 28, 2022Updated 3 years ago
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆60Jan 5, 2026Updated last month
- A tool that supports finding and abusing whitelisted programs to allow arbitrary file writing into the executable folder of Antivirus sof…☆81Nov 1, 2025Updated 3 months ago
- Interactive PowerShell framework for testing WMI, COM, LOLBAS, and persistence techniques☆94Dec 28, 2025Updated last month