Learn AI security through a series of vulnerable LLM CTF challenges. No sign ups, no cloud fees, run everything locally on your system.
☆326Aug 22, 2024Updated last year
Alternatives and similar repositories for ai-goat
Users that are interested in ai-goat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CTF challenges designed and implemented in machine learning applications☆207Oct 8, 2025Updated 5 months ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆170Oct 13, 2023Updated 2 years ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- ☆387Jun 25, 2025Updated 9 months ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆142Jan 2, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆269Sep 16, 2025Updated 6 months ago
- AI featured threat modeling and security review project☆17Nov 17, 2024Updated last year
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Oct 9, 2024Updated last year
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINT☆37Feb 26, 2024Updated 2 years ago
- Extensible vulnerable AI Bot to illustrate vulnerabilities in LLM applications.☆21Jun 17, 2024Updated last year
- Payloads for Attacking Large Language Models☆130Jan 13, 2026Updated 2 months ago
- ☆18Apr 15, 2024Updated last year
- Secutils.dev is an open-source, versatile, yet simple security toolbox for engineers and researchers☆97Updated this week
- Automated vulnerability discovery and annotation☆68Jul 26, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Modular web-application honeypot platform built using go and gin☆63May 8, 2024Updated last year
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55May 7, 2025Updated 10 months ago
- Azure Post Exploitation Framework☆245Oct 27, 2025Updated 5 months ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆89Dec 7, 2025Updated 3 months ago
- This script searches NVD's website for new CVES, alerting you by email or telegram. You can configure a list of products that interest yo…☆11Mar 21, 2021Updated 5 years ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆96Apr 2, 2025Updated 11 months ago
- Cloud Commotion intends to cause chaos to simulate security incidents☆146Jun 18, 2024Updated last year
- Adversarial Machine Learning (AML) Capture the Flag (CTF)☆113Mar 14, 2024Updated 2 years ago
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆676Feb 17, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- Web Server Vulnerability Scanning Tool☆36Mar 11, 2025Updated last year
- Nameless C2 - A C2 with all its components written in Rust☆285Sep 26, 2024Updated last year
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆104Apr 22, 2024Updated last year
- Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.☆1,917Oct 1, 2025Updated 5 months ago
- Toolkit for creating cryptographic figures and videos.☆35May 17, 2024Updated last year
- 🤫 husher - Encode text to be hidden from human eyes but visible to LLMs☆12Jan 18, 2024Updated 2 years ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆113Nov 13, 2024Updated last year
- the LLM vulnerability scanner☆7,312Mar 19, 2026Updated last week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- 🤖🛡️🔍🔒🔑 Tiny package designed to support red teams and penetration testers in exploiting large language model AI solutions.☆26May 16, 2024Updated last year
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,206Dec 29, 2025Updated 2 months ago
- Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.☆578Feb 12, 2026Updated last month
- Everything and anything related to password spraying☆152May 20, 2024Updated last year
- Zero shot vulnerability discovery using LLMs☆2,592Feb 6, 2025Updated last year
- RCE through a race condition in Apache Tomcat☆57Dec 21, 2024Updated last year
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 5 years ago