TakSec / Prompt-Injection-EverywhereLinks
Prompt Injections Everywhere
☆144Updated last year
Alternatives and similar repositories for Prompt-Injection-Everywhere
Users that are interested in Prompt-Injection-Everywhere are comparing it to the libraries listed below
Sorting:
- A LLM explicitly designed for getting hacked☆160Updated 2 years ago
- ☆236Updated last year
- Search for sensitive data in Postman public library.☆212Updated 2 weeks ago
- 🤖 LLM-powered agent for automated Google Dorking in bug hunting & pentesting.☆65Updated last month
- Community curated list of search queries for various products across multiple search engines.☆273Updated this week
- ☆98Updated 4 months ago
- GBounty is a multi-step website vulnerability scanner developed in Golang designed to help companies, pentesters, and bug hunters identif…☆146Updated 2 weeks ago
- This is my personal repo, which includes bug bounty tips, a collection of tools, one-liners, and other resources I personally prefer whil…☆58Updated 4 months ago
- A tool that automates the search for IDOR vulnerabilities in web apps and APIs☆59Updated 4 years ago
- AI for Ethical Hacking - Workshop☆203Updated 3 weeks ago
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆151Updated last month
- The Most Advanced Client-Side Prototype Pollution Scanner☆237Updated 2 weeks ago
- A smarter web fuzzing tool that combines local LLM models and ffuf to optimize directory and file discovery☆318Updated 9 months ago
- AIHTTPAnalyzer revolutionizes web application security testing by bringing artificial intelligence capabilities to Burp Suite. This innov…☆58Updated 6 months ago
- **SubHunterX** is an automated tool for subdomain enumeration, vulnerability scanning, and exploitation. It discovers subdomains, detects…☆30Updated 5 months ago
- AI/LLM local model integration for analysis of reconftw results☆78Updated 4 months ago
- ai-based domain name generation☆95Updated 7 months ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆164Updated last year
- This tool will check for Sensitive Data Leakage with some useful patterns/RegEx. The patterns are mostly targeted on waybackdata and filt…☆231Updated 3 months ago
- Welcome to the Bug Hunter's Wordlists repository! 🐛🔍 This repository serves as a comprehensive collection of essential wordlists utiliz…☆149Updated last year
- Nuclei-AI-Prompts☆243Updated 2 months ago
- ☆144Updated 6 months ago
- ☆182Updated 10 months ago
- Automated OSINT on SwaggerHub☆179Updated last year
- The Template Injection Playground allows to test a large number of the most relevant template engines for template injection possibilitie…☆48Updated last month
- CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).☆137Updated 5 months ago
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆128Updated 3 weeks ago
- ☆122Updated 3 weeks ago
- ☆152Updated last year
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆152Updated last year