Tree of Attacks (TAP) Jailbreaking Implementation
☆118Feb 7, 2024Updated 2 years ago
Alternatives and similar repositories for parley
Users that are interested in parley are comparing it to the libraries listed below
Sorting:
- Remote code execution in Power Platform connectors via JSON deserialization☆23Mar 30, 2023Updated 2 years ago
- Data Scientists Go To Jupyter☆68Mar 3, 2025Updated 11 months ago
- A utility to inspect, validate, sign and verify machine learning model files.☆66Feb 5, 2025Updated last year
- Minimal workflows☆20Mar 19, 2024Updated last year
- ☆18Apr 15, 2024Updated last year
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55May 7, 2025Updated 9 months ago
- General research for Dreadnode☆27Jun 17, 2024Updated last year
- Arxiv + Notion Sync☆20May 12, 2025Updated 9 months ago
- ☆12Feb 19, 2026Updated last week
- ELF Beacon Object File (BOF) Template☆19Nov 18, 2024Updated last year
- Central repo for talks and presentations☆47Jul 23, 2024Updated last year
- ☆16May 30, 2024Updated last year
- Machine learning enabled dropper☆28May 1, 2023Updated 2 years ago
- A standalone tool for logging shell commands to GhostWriter automatically☆19Aug 24, 2024Updated last year
- Implementation of BEAST adversarial attack for language models (ICML 2024)☆90May 14, 2024Updated last year
- Simple reverse ICMP shell☆14Apr 30, 2024Updated last year
- ☆26Nov 8, 2024Updated last year
- ☆121Nov 21, 2024Updated last year
- Persistence via Shell Extensions☆64Aug 4, 2023Updated 2 years ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Nov 24, 2023Updated 2 years ago
- Lightweight LLM Interaction Framework☆407Updated this week
- Copy cat model for Proofpoint☆91Apr 30, 2020Updated 5 years ago
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆84May 2, 2025Updated 9 months ago
- Examples of various container types for Python and Golang☆16Aug 29, 2025Updated 5 months ago
- Demo of using WASM to sandbox Plotly execution☆19Mar 30, 2025Updated 10 months ago
- An insecurely implemented and installed Windows service for emulating elevation of privileges vulnerabilities☆63Aug 25, 2022Updated 3 years ago
- DFSCoerce exe revisited version with custom authentication☆42Jan 13, 2024Updated 2 years ago
- Abuse leaked token handles.☆136Dec 14, 2023Updated 2 years ago
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- Spins up a docker container with several useful tools for offensive security in macOS/cloud environments. Also installs the needed depend…☆18Nov 3, 2021Updated 4 years ago
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆122Jul 2, 2024Updated last year
- ☆53Oct 10, 2023Updated 2 years ago
- Analysis of the vulnerability☆50Jan 23, 2024Updated 2 years ago
- Phunter is an osint tool allowing you to find various information via a phone number 🔎📞☆14Apr 7, 2024Updated last year
- rust clr heap encryption (https://github.com/lap1nou/CLR_Heap_encryption), but no heap encryption.☆17Jan 6, 2024Updated 2 years ago
- a CLI that provides a generic automation layer for assessing the security of ML models☆910Jul 18, 2025Updated 7 months ago
- ☆31Feb 28, 2025Updated 11 months ago
- Submission, compilation and execution of C# code snippets, using an unmanaged CLR Host☆53Jan 29, 2015Updated 11 years ago
- pyForgeCert is a Python equivalent of the ForgeCert.☆69Aug 15, 2023Updated 2 years ago