StavC / Here-Comes-the-AI-WormView external linksLinks
Here Comes the AI Worm: Preventing the Propagation of Adversarial Self-Replicating Prompts Within GenAI Ecosystems
☆222Sep 7, 2025Updated 5 months ago
Alternatives and similar repositories for Here-Comes-the-AI-Worm
Users that are interested in Here-Comes-the-AI-Worm are comparing it to the libraries listed below
Sorting:
- A library for interacting with Windows through SMB written in Nim.☆16Sep 14, 2025Updated 5 months ago
- HTML Smuggling with Web Assembly☆66Feb 20, 2024Updated last year
- Various one-off pentesting projects written in Nim. Updates happen on a whim.☆162Jul 14, 2025Updated 7 months ago
- Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies☆123May 29, 2024Updated last year
- Dynamically resolve API function addresses at runtime in a secure manner.☆72Nov 11, 2025Updated 3 months ago
- ☆100Oct 7, 2023Updated 2 years ago
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆26Feb 29, 2024Updated last year
- Code for Voice Jailbreak Attacks Against GPT-4o.☆36May 31, 2024Updated last year
- A simple web viewer for TruffleHog JSON output.☆19Jan 7, 2026Updated last month
- example using NtCreateUserProcess in rust☆19Jan 20, 2025Updated last year
- Automated Evilginx phishlet creator Extension for Burpsuite☆63Jan 10, 2025Updated last year
- ☆32Jun 1, 2024Updated last year
- Spoofing desktop login applications with WinForms and WPF☆176Feb 19, 2024Updated last year
- Local & remote Windows DLL Proxying☆170Jun 17, 2024Updated last year
- Modern PIC implant for Windows (64 & 32 bit)☆105Jul 23, 2025Updated 6 months ago
- Structured CSVs and table schemas extracted from the 29-April-2025 LockBit affiliate-panel database leak.☆28May 8, 2025Updated 9 months ago
- Python implementation of GhostPack's Seatbelt situational awareness tool☆270Nov 12, 2024Updated last year
- Click Once + App Domain☆64Dec 4, 2023Updated 2 years ago
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆280Sep 18, 2024Updated last year
- ☆150Mar 22, 2024Updated last year
- ☆27May 6, 2024Updated last year
- PoC for the Veeam Recovery Orchestrator Authentication CVE-2024-29855☆20Jun 17, 2024Updated last year
- Nameless C2 - A C2 with all its components written in Rust☆282Sep 26, 2024Updated last year
- ☆63Mar 14, 2024Updated last year
- (MeetC2 a.k.a Meeting C2) - A framework abusing Google Calendar APIs.☆132Sep 4, 2025Updated 5 months ago
- The Python Risk Identification Tool for generative AI (PyRIT) is an open source framework built to empower security professionals and eng…☆3,408Updated this week
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆99Jul 7, 2023Updated 2 years ago
- ☆248Jul 31, 2024Updated last year
- source code for the offsecml framework☆44Jun 6, 2024Updated last year
- Decrypt Veeam database passwords☆222Dec 8, 2025Updated 2 months ago
- ☆230Jun 10, 2025Updated 8 months ago
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆75May 19, 2024Updated last year
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55May 7, 2025Updated 9 months ago
- ☆75Apr 8, 2024Updated last year
- Simple reverse ICMP shell☆14Apr 30, 2024Updated last year
- Script to mass deauthenticate multiple wireless clients.☆12Jan 1, 2017Updated 9 years ago
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆12Apr 21, 2025Updated 9 months ago
- Frontend to import Nmap Scan in ES, and frontend to make search☆10Nov 16, 2014Updated 11 years ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆50Feb 29, 2024Updated last year