christiancscott / awesome-LLM-securityView external linksLinks
A compendium of threat modeling and security testing resources for LLMs and GenAI agents
☆19Oct 16, 2024Updated last year
Alternatives and similar repositories for awesome-LLM-security
Users that are interested in awesome-LLM-security are comparing it to the libraries listed below
Sorting:
- attempt to perma root the NEC Terrain android phone☆10Jul 24, 2015Updated 10 years ago
- Step-by-step guide to installing TensorFlow with GPU support on Conda.☆12Apr 15, 2025Updated 10 months ago
- A set of Protocol Buffers tools and modules for Erlang applications.☆17Aug 18, 2012Updated 13 years ago
- ☆10Jul 30, 2017Updated 8 years ago
- ☆10Jan 14, 2015Updated 11 years ago
- ☆10Aug 2, 2016Updated 9 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 9 years ago
- 安全风险评估管理系统☆11Jun 27, 2015Updated 10 years ago
- Vulnerability Knowledge Base comparison tool☆13Feb 9, 2022Updated 4 years ago
- AutoSecGPT is an AI-power tool that supports security teams to model threats associated with their automotive application to ease the pro…☆13Apr 28, 2025Updated 9 months ago
- Dradis API Python Wrapper☆13Mar 19, 2024Updated last year
- Материалы к статье "Препарируем Hyper V"☆14Nov 5, 2014Updated 11 years ago
- Documentation and Support for AttackForge ReportGen☆19Jul 26, 2025Updated 6 months ago
- Automatically exported from code.google.com/p/timing-attestation☆13Jun 29, 2015Updated 10 years ago
- Set of useful scrpts☆10Jan 4, 2015Updated 11 years ago
- Examine, a memory leak checker on Windows☆13Jun 4, 2016Updated 9 years ago
- Scripting Assembly Language☆12Sep 2, 2015Updated 10 years ago
- LLM Supported Attack Scenario Creator from Code Review☆14Oct 22, 2024Updated last year
- Background info on endless / infinite potentiometers, code to read them out and examples for pcb designs with ADCs☆12Dec 27, 2025Updated last month
- Fortify enables web applications to use smart cards, local certificate stores and do certificate enrollment. This is the "Tool" applicati…☆16Jan 22, 2026Updated 3 weeks ago
- Run a windows process with many inputs and catch exit codes☆14Jan 5, 2016Updated 10 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Feb 13, 2019Updated 7 years ago
- Graphical analysis of PDF structure.☆13Jan 9, 2017Updated 9 years ago
- Presenters, titles & links☆10Apr 13, 2015Updated 10 years ago
- Repository to store the Threat Reports made by the McAfee Enterprise ATR Team☆10Oct 11, 2018Updated 7 years ago
- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing☆10Mar 30, 2016Updated 9 years ago
- declarative web interfaces using semantic data☆32Sep 15, 2015Updated 10 years ago
- ☆10Aug 13, 2015Updated 10 years ago
- ☆11Jul 25, 2020Updated 5 years ago
- Kernel Shellcode to add all privileges in token☆15Mar 13, 2017Updated 8 years ago
- ☆13Jun 13, 2017Updated 8 years ago
- Crappy Win32k syscall fuzzer☆13May 2, 2015Updated 10 years ago
- Classifying Relations by Ranking with Convolutional Neural Networks☆12May 22, 2019Updated 6 years ago
- My masters degree dissertation for ISG, Royal Holloway (2011) on evolutionary fuzzing☆11Jul 22, 2016Updated 9 years ago
- Automatically perform advanced NTLM hash relay attacks☆15Nov 4, 2022Updated 3 years ago
- Discover domain names based on SSL certificates.☆15Dec 18, 2024Updated last year
- ☆13Jul 31, 2020Updated 5 years ago
- List of Awesome Red Teaming Resources☆13Sep 2, 2021Updated 4 years ago
- Two applications for the M5Stack ATOM Echo running MicroPython.☆14Jun 2, 2020Updated 5 years ago