danielmiessler / neovimLinks
My Neovim settings
☆27Updated 2 years ago
Alternatives and similar repositories for neovim
Users that are interested in neovim are comparing it to the libraries listed below
Sorting:
- The Arcanum Prompt Injection Taxonomy☆322Updated 3 months ago
- This is a RSS feed collection for all the InfoSec Content Creators☆33Updated 2 years ago
- A very opinionated list of security tools☆128Updated 8 months ago
- A curated list of awesome resources, tools, and other shiny things for GPT prompt engineering.☆55Updated 2 years ago
- OWASP Foundation web repository☆473Updated this week
- Reference notes for Attacking and Defending Generative AI presentation☆67Updated last year
- AI featured threat modeling and security review action☆45Updated last year
- Whois for the Cloud: Recon tool for cloud provider attribution. Supports AWS, Azure, Google, Cloudflare, and Digital Ocean.☆181Updated last month
- Cowrie SSH/Telnet Honeypot http://cowrie.readthedocs.io☆12Updated 5 years ago
- AI Security Shared Responsibility Model☆85Updated 2 months ago
- ☆378Updated last year
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆255Updated 3 years ago
- Code and Website For PatchThis.app☆32Updated this week
- Proximity is a MCP security scanner powered with NOVA☆228Updated 2 months ago
- ☆63Updated 5 months ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆271Updated 6 months ago
- Dredging up secrets from the depths of the file system☆132Updated last year
- A curated checklist of tasks to be done during engagements☆34Updated last year
- Personal Access Token (PAT) recon tool for bug bounty hunters, pentesters & red teams☆36Updated 4 months ago
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆34Updated 9 months ago
- A Command-line tool which leverages the Tenable Vulnerability Management API to reduce the time it takes to get information that is commo…☆83Updated last week
- Knowledge base on cybercriminal concealment techniques☆80Updated 6 months ago
- Create your own vulnerable by design AWS penetration testing playground☆406Updated 3 months ago
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆258Updated 4 months ago
- The notebook for my talk - ChatGPT: Your Red Teaming Ally☆50Updated 2 years ago
- A Go-based utility that processes input through multiple AI models concurrently (OpenAI, Claude, and Gemini) and provides a summarized co…☆88Updated 5 months ago
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆150Updated 2 years ago
- Halberd : Multi-Cloud Agentic Attack Tool☆321Updated 3 weeks ago
- Payloads for AI Red Teaming and beyond☆305Updated 3 months ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆98Updated last month