c-goosen / ai-prompt-ctfView external linksLinks
Agentic LLM CTF to test prompt injection attacks and preventions
☆27Feb 9, 2026Updated last week
Alternatives and similar repositories for ai-prompt-ctf
Users that are interested in ai-prompt-ctf are comparing it to the libraries listed below
Sorting:
- A playground to test various prompt injection techniques and bypasses.☆20Mar 31, 2023Updated 2 years ago
- Open-source LLM Prompt-Injection and Jailbreaking Playground☆29Jul 19, 2025Updated 6 months ago
- convert secret patterns to gf compatible.☆38Feb 11, 2023Updated 3 years ago
- Arduino keyboard languages for easy swapping of keyboard layout codes to match your language, ideal for non US users☆10Apr 5, 2024Updated last year
- ☆22Jan 8, 2026Updated last month
- Learn about a type of vulnerability that specifically targets machine learning models☆406Sep 14, 2025Updated 5 months ago
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- My solutions for pwn and reversing challenges☆10Mar 18, 2018Updated 7 years ago
- Modular framework for automating triaging, malware analysis, and analyst workflows☆45May 2, 2025Updated 9 months ago
- hardware accelerated graphics rendering on RGB LED matrix and Raspberry PI☆11Jun 28, 2018Updated 7 years ago
- ☆12Nov 21, 2022Updated 3 years ago
- Python tool to parse and decrypt files quarantined by windows defender☆13Feb 25, 2023Updated 2 years ago
- A tool for patching/injecting code into elf binaries.☆14Sep 27, 2012Updated 13 years ago
- Some useful libraries converted to WatcomC++.☆15Feb 10, 2026Updated last week
- eBPF Tools - Tool for monitoring, performance benchmarking and tracing linux kernel☆16Jan 29, 2021Updated 5 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- A list of universities with vulnerability disclosure policies☆13Jul 10, 2020Updated 5 years ago
- Burp Suite extension to detect Web Cache Deception vulnerabilities, now compatible with the Community Edition. Automates advanced cache …☆15Nov 18, 2025Updated 2 months ago
- Random Codes Related to Reverse Engineering☆10Nov 24, 2022Updated 3 years ago
- a brief example of mqtt usage to send camera stream to web page☆11May 4, 2022Updated 3 years ago
- A toolkit for CTF challenges☆10Jan 18, 2017Updated 9 years ago
- ☆14Sep 28, 2023Updated 2 years ago
- Source code for 'Software Exorcism' by Bill Blunden☆13Mar 30, 2017Updated 8 years ago
- PANDA-powered tracing engine for tenet☆11Apr 7, 2022Updated 3 years ago
- Detection of malicious data exfiltration over DNS using Machine Learning techniques☆13Jul 8, 2020Updated 5 years ago
- Test program to help spoof and mimic different wifi drones☆15Jul 29, 2024Updated last year
- A mitmproxy addon that allows use of the HTTP Toolkit Android app.☆10Jun 25, 2023Updated 2 years ago
- A framework for lifting ARM32 to LLVM-IR and merging resulting code with LLVM-IR generated from source-code.☆12Oct 20, 2022Updated 3 years ago
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆15Sep 10, 2024Updated last year
- Ludus roles to deploy ASR rules and MDI auditing settings☆16Aug 5, 2025Updated 6 months ago
- Bulk indicator VirusTotal lookups supporting file hashes, domains and IPs.☆12May 28, 2025Updated 8 months ago
- Pop Os dotfiles☆10Mar 18, 2023Updated 2 years ago
- A basic Terraform configuration for provisioning simple red team infrastructure in DigitalOcean☆12May 5, 2021Updated 4 years ago
- Analyze, tweak and extract morse code from audio files.☆12Aug 25, 2022Updated 3 years ago
- Boosting Natural Language Generation from Instructions with Meta-Learning☆11Dec 20, 2022Updated 3 years ago
- ☆13Jan 11, 2023Updated 3 years ago
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 3 months ago
- ☆15Nov 10, 2014Updated 11 years ago
- GDB that can debug Mach-Os on Linux☆15Aug 11, 2017Updated 8 years ago