andreashappe / cochiseLinks
Autonomous Assumed Breach Penetration-Testing Active Directory Networks
☆37Updated this week
Alternatives and similar repositories for cochise
Users that are interested in cochise are comparing it to the libraries listed below
Sorting:
- ☆83Updated last week
- Verizon Burp Extensions: AI Suite☆142Updated 9 months ago
- A modular tool to search for known vulnerabilities, exploits and more across various data sources☆75Updated last week
- using ML models for red teaming☆45Updated 2 years ago
- https://lolad-project.github.io/☆84Updated last year
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆46Updated 2 years ago
- C2 Automation using Linode☆85Updated 3 years ago
- ☆148Updated this week
- This project is a deliberately vulnerable environment to learn about LLM-specific risks based on the OWASP Top 10 for LLM Applications.☆48Updated 3 weeks ago
- Red AI Archive: Jeff Sims - A curated collection of work in AI safety, cybersecurity data science, and AI red teaming – my own research a…☆26Updated 10 months ago
- LLM-based automated patch diffing☆91Updated 4 months ago
- source code for the offsecml framework☆44Updated last year
- Just learning around new stuff mostly Red Teaming and such but will try to see if I can update or simplify them more, nothing too exotic …☆44Updated 3 years ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆45Updated 7 months ago
- ☆73Updated last year
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated 2 years ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆61Updated 2 months ago
- Detonate malware on VMs and get logs & detection status☆76Updated last week
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆51Updated 3 years ago
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆76Updated 10 months ago
- ☆92Updated this week
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆157Updated last year
- OWASP Web Security Testing Guide RAG system with ChromaDB, MCP for Claude Code☆17Updated 2 months ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated last year
- ☆18Updated 8 months ago
- ☆19Updated 3 years ago
- A modular framework for benchmarking LLMs and agentic strategies on security challenges across HackTheBox, TryHackMe, PortSwigger Labs, C…☆197Updated this week
- Red Team Collaboration Infrastructure☆98Updated 9 months ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Updated last year
- CVE-2025-1974☆90Updated 10 months ago