forcesunseen / llm-hackers-handbookView external linksLinks
A guide to LLM hacking: fundamentals, prompt injection, offense, and defense
☆182Apr 14, 2023Updated 2 years ago
Alternatives and similar repositories for llm-hackers-handbook
Users that are interested in llm-hackers-handbook are comparing it to the libraries listed below
Sorting:
- Exercises for the course Cyber Security III: Software and Hardware Security IC00AJ74☆20Oct 16, 2025Updated 4 months ago
- Just a bunch of useful scripts for netsec/admin/others☆16Dec 9, 2025Updated 2 months ago
- SSH Bruteforce Basic Script created with C++ to Linux☆10Jan 28, 2023Updated 3 years ago
- SSE to Stdio MCP Proxy Server☆17Jun 9, 2025Updated 8 months ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Apr 30, 2021Updated 4 years ago
- Training for Golang (go language)☆10Mar 29, 2019Updated 6 years ago
- my own 2fa bypass methodolgy☆27Sep 22, 2023Updated 2 years ago
- A curated list of available Bug Bounty & Disclosure Programs and Write-ups.☆75Dec 3, 2023Updated 2 years ago
- LLM Oracle is a GPT-4 powered tool for predicting future events. It's like a Magic 8 Ball that is able to perform basic research, calcula…☆19May 27, 2023Updated 2 years ago
- Small tools to assist with using Large Language Models☆12Nov 7, 2023Updated 2 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Jun 10, 2017Updated 8 years ago
- ☆12Feb 20, 2022Updated 3 years ago
- Strumenti per Domini - Whois - IP - Data Breach - Email☆18Oct 30, 2024Updated last year
- In-depth security research into VAC’s dynamic anti-cheat delivery model, focusing on loader architecture, integrity checks, and defensive…☆22Sep 1, 2025Updated 5 months ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Jan 4, 2023Updated 3 years ago
- CVE-2021-21972 Unauthorized RCE in VMware vCenter metasploit exploit script☆20Mar 7, 2021Updated 4 years ago
- Can Large Language Models Solve Security Challenges? We test LLMs' ability to interact and break out of shell environments using the Over…☆13Aug 21, 2023Updated 2 years ago
- ☆15Oct 11, 2023Updated 2 years ago
- SecTalks socially authored website☆20Jul 23, 2025Updated 6 months ago
- The Repository contains various payloads, tools, tips and tricks from various hackers around the world. Please take a quick look down her…☆15May 15, 2025Updated 9 months ago
- A custom script I created because I got tired of installing my tools manually!☆15May 16, 2023Updated 2 years ago
- ☆17Mar 6, 2023Updated 2 years ago
- A LLM explicitly designed for getting hacked☆166Aug 2, 2023Updated 2 years ago
- DLink DIR-846 Authenticated Remote Code Execution☆18Oct 4, 2023Updated 2 years ago
- All xxx-arsenal repos in one☆17Jan 28, 2019Updated 7 years ago
- ☆16Sep 19, 2025Updated 4 months ago
- Prompt Injections Everywhere☆179Aug 2, 2024Updated last year
- Do It Yourself! (DIY) Web Penetration Testing is a guideline in performing security test cases against web applications☆39Aug 9, 2023Updated 2 years ago
- OsmoTRX - GSM base station transceiver☆22Apr 4, 2019Updated 6 years ago
- My personal repository☆13Jan 18, 2026Updated 3 weeks ago
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Dec 16, 2022Updated 3 years ago
- auto install and carck pritunl and pihole☆20Jun 2, 2023Updated 2 years ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Nov 23, 2021Updated 4 years ago
- ☆96Apr 13, 2024Updated last year
- Private XSS BOMB 16k Payloads The Biggest Payloads List online☆19Dec 31, 2023Updated 2 years ago
- ☆19Jun 24, 2021Updated 4 years ago
- Web interface and APIs for Assemblyline 4☆20Updated this week
- Challenge Python☆19Apr 26, 2023Updated 2 years ago
- ☆20May 18, 2022Updated 3 years ago