asmirkonjevic1 / AI-Hacking-Crash-CourseLinks
☆57Updated 6 months ago
Alternatives and similar repositories for AI-Hacking-Crash-Course
Users that are interested in AI-Hacking-Crash-Course are comparing it to the libraries listed below
Sorting:
- Writeups of challenges and CTFs I participated in☆84Updated 4 months ago
- Hands-on MCP security lab: 10 real incidents reproduced with vulnerable/secure MCP servers, pytest regressions, and Claude/Cursor battle-…☆63Updated 3 weeks ago
- The Arcanum Prompt Injection Taxonomy☆393Updated 2 weeks ago
- A list of curated resources for people interested in AI Red Teaming, Jailbreaking, and Prompt Injection☆420Updated 8 months ago
- A Go-based utility that processes input through multiple AI models concurrently (OpenAI, Claude, and Gemini) and provides a summarized co…☆88Updated 6 months ago
- ☆101Updated last month
- AI for Ethical Hacking - Workshop☆240Updated last month
- Payloads for AI Red Teaming and beyond☆314Updated 4 months ago
- A security system to protect your vibecoded apps☆228Updated last week
- gRPC Goat is a "Vulnerable by Design" lab created to provide an interactive, hands-on playground for learning and practicing gRPC securit…☆50Updated 3 months ago
- ☆35Updated 9 months ago
- The Shodan MCP Server by ADEO Cybersecurity Services provides cybersecurity professionals with streamlined access to Shodan's powerful re…☆18Updated 9 months ago
- ☆63Updated 6 months ago
- A collection of Turbo Intruder scripts.☆65Updated 10 months ago
- Automated red-team toolkit for stress-testing LLM defences - Vector Attacks on LLMs (Gendalf Case Study)☆107Updated 5 months ago
- AISA-Scanner is an AI-powered autonomous vulnerability scanner that maps CVEs to metasploit exploits, MITRE, CEH, and SANS, delivering in…☆30Updated 5 months ago
- Prompt Injections Everywhere☆174Updated last year
- A deliberately vulnerable mobile banking application designed for practicing mobile security testing. Features common vulnerabilities fou…☆72Updated last month
- ☆215Updated last week
- Reference notes for Attacking and Defending Generative AI presentation☆69Updated last year
- AI / LLM Red Team Field Manual & Consultant’s Handbook☆216Updated last week
- A curated list of cloud pentesting resource, contains AWS, Azure, Google Cloud☆138Updated 3 years ago
- ☆193Updated 8 months ago
- AI/LLM local model integration for analysis of reconftw results☆85Updated 7 months ago
- Appollo is an open-source tool for continuous attack surface monitoring, helping organizations identify, analyze, and mitigate security r…☆44Updated 8 months ago
- Scan websites for exposed Supabase JWTs, enumerate accessible tables, and detect sensitive data exposure automatically.☆73Updated this week
- A web based checklist driven note taking app following bug bounty and web app pentest methodology.☆41Updated 6 months ago
- ☆161Updated 9 months ago
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆71Updated 8 months ago
- Security automation with n8n ideas: 100+ Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.☆225Updated 3 months ago