The purpose of this document is to outline the security risks and vulnerabilities that may arise when implementing ai in web applications and to provide best practices for mitigating these risks.
☆33Jan 31, 2026Updated last month
Alternatives and similar repositories for AI-API-Security-Best-Practices
Users that are interested in AI-API-Security-Best-Practices are comparing it to the libraries listed below
Sorting:
- The code interpreter is a tool developed by OpenAI to execute programming code in an interactive environment. It is capable of running Py…☆44Dec 11, 2025Updated 2 months ago
- A full Mod_Security guide to use local software like clam-av, chkrootkit, fail2ban, rkhunter for Nginx & Apache☆23Feb 6, 2026Updated last month
- AiCC Comments Reply with GPT(OpenAi) is a plugin that uses OpenAI's GPT to automatically reply to comments on your WordPress website. The…☆22Sep 10, 2025Updated 5 months ago
- Professional Use Only - Handle With Extreme Care! This tool is designed for experienced security professionals and red teams. It provides…☆16Dec 25, 2025Updated 2 months ago
- ChatGPT ShellMaster enables command-line interactions via chat using OpenAI's ChatGPT Plus. Run scripts, manage files, and monitor proces…☆60Jan 24, 2025Updated last year
- Advanced use of WPScan (WordPress Security Scanner) with other tools like nmap, nikto, owasp-zap, ids for ethnical Hackers☆23Aug 13, 2025Updated 6 months ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Jul 15, 2024Updated last year
- Adjust your database configuration to align with your server hardware and usage patterns. This involves tweaking parameters like buffer s…☆31Dec 5, 2025Updated 3 months ago
- A basic GPT conversation script designed to help you learn to interact with OpenAI's GPT technology. Includes best practices and a free s…☆87Jul 2, 2025Updated 8 months ago
- A structured red-team prompt for generating ethical hacking tools using AI - designed for use in labs, CTFs, and authorized security asse…☆25Jun 26, 2025Updated 8 months ago
- FortiGate configuration analysis and transformation☆19Dec 22, 2025Updated 2 months ago
- ☆23Feb 14, 2023Updated 3 years ago
- A collection of email templates for use with the MainWP Client Reports extension☆17Sep 10, 2019Updated 6 years ago
- PoC - Authenticated Remote Code Execution in VMware vCenter Server (Exploit)☆44Jul 16, 2024Updated last year
- ClientInspectorV2 - Unleashing the power of Azure LogAnalytics, Azure Data Collection Rules, Log Ingestion API by doing client inventory …☆25Apr 28, 2023Updated 2 years ago
- This repository presents a detailed case study on tracking cryptocurrency transactions and uncovering dark web operations. Using open-sou…☆33Apr 14, 2025Updated 10 months ago
- The Ukr-Books-ChatGPT-Plugin is a Python-based plugin designed to enhance the capabilities of OpenAI's ChatGPT model by integrating it wi…☆19Jul 21, 2023Updated 2 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆24Jul 19, 2024Updated last year
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using mailg…☆27Jul 19, 2024Updated last year
- The HPE Alletra 9000 and Primera and 3PAR PowerShell Toolkit supports cmdlets, which are wrappers around the native HPE Alletra 9000 or H…☆12Dec 21, 2022Updated 3 years ago
- Checker de cuentas Blim para android [TERMUX]☆11Jan 21, 2019Updated 7 years ago
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆77Jul 31, 2024Updated last year
- A tool for analyzing vulnerabilities in JWT tokens. Advanced JWT Vulnerability Scanner & Exploitation Toolkit☆44Nov 24, 2025Updated 3 months ago
- AI-based voice assistant implemented in Python for hands-free interactions with computers.☆10Mar 23, 2024Updated last year
- 🚀 RocketAPI PHP SDK for Instagram & Threads Private API 2025☆13Apr 22, 2025Updated 10 months ago
- A simple network stress test tool.☆14Feb 24, 2024Updated 2 years ago
- ☆10Feb 19, 2023Updated 3 years ago
- IT Risk Management tools☆14Apr 4, 2025Updated 11 months ago
- Create VCF file from exported Telegram data☆11May 21, 2019Updated 6 years ago
- A driver created to bypass the anti-cheat and r/w memory through it☆15Aug 3, 2024Updated last year
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Aug 22, 2024Updated last year
- CVE-2024-22274: Authenticated Remote Code Execution in VMware vCenter Server☆38Jul 6, 2024Updated last year
- An advanced AI-driven vulnerability scanner and penetration testing tool that integrates multiple AI providers (OpenAI, Grok, OLLAMA, Cla…☆34Nov 7, 2025Updated 3 months ago
- Making a lab and testing the CVE-2024-3116, a Remote Code Execution in pgadmin <=8.4☆12Apr 11, 2024Updated last year
- Wireguard Key Generator, web-based, client-side, trustless☆13Feb 3, 2025Updated last year
- ☆10Jan 9, 2026Updated last month
- Python 2.7 Library for the BitPay API☆10Oct 31, 2019Updated 6 years ago
- A really dumb proof of concept that bundles the nightly branch builds of all of the *arr applications into a single container.☆15Updated this week
- PoC List☆10Sep 4, 2022Updated 3 years ago