deadbits / llm-tools
Small tools to assist with using Large Language Models
☆11Updated last year
Alternatives and similar repositories for llm-tools
Users that are interested in llm-tools are comparing it to the libraries listed below
Sorting:
- Catalog Red Team techniques that cause popups in various macOS versions☆14Updated 5 months ago
- ☆13Updated 4 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Updated last year
- Python 3 library to build YARA rules.☆13Updated 3 years ago
- Crashbench is a LLM benchmark to measure bug-finding and reporting capabilities of LLMs☆13Updated 6 months ago
- Linux-KVM with rVMI extensions☆22Updated 7 years ago
- GoLang Scripting Expert, a repo for template scripts regarding basic golang functions, many with a security focus☆22Updated 4 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Updated 10 years ago
- Static configuration extractor for the Karton framework☆10Updated 4 months ago
- ☆18Updated 4 years ago
- Easily scan with multiple yara rules from different sources.☆14Updated last year
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆18Updated 3 years ago
- This is a repository to experiment with MCP for security☆34Updated 3 months ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Updated 6 years ago
- Python-based cloud node for local use☆11Updated 7 years ago
- Manticore's Public Threats Repository☆10Updated 4 years ago
- ☆24Updated 2 years ago
- Generate bulk YARA rules from YAML input☆22Updated 5 years ago
- Plugins for the Viper Framework☆14Updated 5 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆22Updated 3 years ago
- This repository regroups the Yara Rules for the Unprotect Project☆25Updated 4 years ago
- Speaking materials from conferences I've given☆9Updated 2 years ago
- ☆12Updated 3 years ago
- ☆19Updated last year
- Phishing sites configured to work with Netlify form handling☆12Updated 5 years ago
- CyCAT.org taxonomies☆15Updated 3 years ago
- A multi-threaded malware sample downloader based upon given MD-5/SHA-1/SHA-256 hashes, using multiple malware databases.☆30Updated 2 years ago
- Broken web app intentionally built with pentesting obstacles☆15Updated 5 years ago
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 5 years ago