andreashappe / cochiseLinks
Autonomous Assumed Breach Penetration-Testing Active Directory Networks
☆21Updated last week
Alternatives and similar repositories for cochise
Users that are interested in cochise are comparing it to the libraries listed below
Sorting:
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Updated 2 years ago
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆131Updated 8 months ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆115Updated last year
- ☆52Updated 2 weeks ago
- using ML models for red teaming☆44Updated 2 years ago
- Interactive, dynamic, and realistic LLM honeypots☆58Updated 6 months ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆56Updated this week
- ☆59Updated last month
- An Adaptive Misuse Detection System☆44Updated 9 months ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated last year
- ☆91Updated 3 weeks ago
- https://arxiv.org/abs/2412.02776☆59Updated 8 months ago
- This repository contains attack chains generated by Aurora that can be reproduced in virtual environments.☆21Updated last month
- ☆43Updated 2 years ago
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆78Updated 3 months ago
- ☆80Updated 2 years ago
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆75Updated this week
- Cybersecurity Intelligent Pentesting Helper for Ethical Researcher (CIPHER). Fine tuned LLM for penetration testing guidance based on wri…☆30Updated 8 months ago
- Verizon Burp Extensions: AI Suite☆137Updated 4 months ago
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆52Updated 4 months ago
- All things specific to LLM Red Teaming Generative AI☆28Updated 10 months ago
- Example agents for the Dreadnode platform☆16Updated last month
- automated tool designed to streamline the search and identification of Proofs of Concept (POCs)☆17Updated last year
- A Model Context Protocol (MCP) server for querying the VirusTotal API.☆81Updated 5 months ago
- A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.☆36Updated 2 years ago
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆51Updated this week
- Data Scientists Go To Jupyter☆65Updated 5 months ago
- [IJCAI 2024] Imperio is an LLM-powered backdoor attack. It allows the adversary to issue language-guided instructions to control the vict…☆41Updated 6 months ago
- ☆28Updated last year
- source code for the offsecml framework☆41Updated last year