dhammon / ai-goatView external linksLinks
Learn AI security through a series of vulnerable LLM CTF challenges. No sign ups, no cloud fees, run everything locally on your system.
☆314Aug 22, 2024Updated last year
Alternatives and similar repositories for ai-goat
Users that are interested in ai-goat are comparing it to the libraries listed below
Sorting:
- CTF challenges designed and implemented in machine learning applications☆201Oct 8, 2025Updated 4 months ago
- ☆362Jun 25, 2025Updated 7 months ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆166Oct 13, 2023Updated 2 years ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆141Jan 2, 2025Updated last year
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Oct 9, 2024Updated last year
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- Payloads for Attacking Large Language Models☆119Jan 13, 2026Updated last month
- Extensible vulnerable AI Bot to illustrate vulnerabilities in LLM applications.☆18Jun 17, 2024Updated last year
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆113Nov 13, 2024Updated last year
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55May 7, 2025Updated 9 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆104Apr 22, 2024Updated last year
- ☆18Sep 14, 2023Updated 2 years ago
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆674Jun 4, 2024Updated last year
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆259Sep 16, 2025Updated 4 months ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆87Dec 7, 2025Updated 2 months ago
- Automated vulnerability discovery and annotation☆68Jul 26, 2024Updated last year
- Cloud Commotion intends to cause chaos to simulate security incidents☆145Jun 18, 2024Updated last year
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆96Apr 2, 2025Updated 10 months ago
- RCE through a race condition in Apache Tomcat☆56Dec 21, 2024Updated last year
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINT☆37Feb 26, 2024Updated last year
- Nameless C2 - A C2 with all its components written in Rust☆282Sep 26, 2024Updated last year
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆196Apr 14, 2024Updated last year
- A PoC to Simulate Ransomware Attack on AWS Environment☆32Oct 14, 2024Updated last year
- Lab used for workshop and CTF☆491Feb 3, 2026Updated last week
- Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.☆1,848Oct 1, 2025Updated 4 months ago
- Azure Post Exploitation Framework☆244Oct 27, 2025Updated 3 months ago
- Secutils.dev is an open-source, versatile, yet simple security toolbox for engineers and researchers☆80Dec 25, 2025Updated last month
- Adversarial Machine Learning (AML) Capture the Flag (CTF)☆114Mar 14, 2024Updated last year
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆40Aug 29, 2024Updated last year
- Azure DevOps Services Attack Toolkit☆313Mar 15, 2025Updated 10 months ago
- Everything and anything related to password spraying☆151May 20, 2024Updated last year
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 5 years ago
- ☆18Apr 15, 2024Updated last year
- LLM Testing Findings Templates☆75Feb 14, 2024Updated last year
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,036Jan 11, 2026Updated last month
- Modular web-application honeypot platform built using go and gin☆63May 8, 2024Updated last year
- Search engine for CTF writeups with instant results.☆152Mar 6, 2025Updated 11 months ago
- Zero shot vulnerability discovery using LLMs☆2,487Feb 6, 2025Updated last year