deadbits / llm-toolsLinks
Small tools to assist with using Large Language Models
☆12Updated 2 years ago
Alternatives and similar repositories for llm-tools
Users that are interested in llm-tools are comparing it to the libraries listed below
Sorting:
- ☆13Updated 5 years ago
- DEF CON 31 AI Village - LLMs: Loose Lips Multipliers☆10Updated 2 years ago
- LLM prompt attacks for hacker CTFs via CTFd.☆15Updated 2 years ago
- A python library for building and using hash databases.☆22Updated 2 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Updated last year
- Python-based cloud node for local use☆11Updated 7 years ago
- Data Scientists Go To Jupyter☆68Updated 11 months ago
- ☆24Updated 3 years ago
- Rekall Forensics and Incident Response Framework with rVMI extensions☆33Updated 4 years ago
- ☆29Updated 2 years ago
- Python 3 library to build YARA rules.☆13Updated 4 years ago
- Easily scan with multiple yara rules from different sources.☆13Updated last year
- Analyzes open source bug trackers for interesting vulnerabilities☆23Updated 11 years ago
- Python emulator for Excel XLM macros.☆18Updated 5 years ago
- Minimal Indicator Storage System☆11Updated 4 years ago
- HoneyDB Python Module☆14Updated 2 years ago
- GoLang Scripting Expert, a repo for template scripts regarding basic golang functions, many with a security focus☆23Updated 5 years ago
- Virustotal Data to Timesketch☆16Updated 6 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- This repository contains hit lists to use for web application content discovery.☆11Updated 8 years ago
- Scripts to secure and harden Mac OS X☆30Updated 4 years ago
- BSidesLV 2015 Exploit Kit Analysis Workshop Files☆27Updated 10 years ago
- Print the strings of encoded printable characters in files☆12Updated 10 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆70Updated 7 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- Use Markov Chains to obfuscate data as other data☆54Updated 9 years ago
- Catalog Red Team techniques that cause popups in various macOS versions☆15Updated last year
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆18Updated 4 years ago
- Exposing the Neutrino EK: All the Naughty Bits (BSidesLV16)☆15Updated 9 years ago
- A python script that allows a researcher to merge databases from Malshare and Malware Bazaar to created enrriched datasets from SIEM tool…☆28Updated 5 years ago