A guide to LLM hacking: fundamentals, prompt injection, offense, and defense
☆188Apr 14, 2023Updated 2 years ago
Alternatives and similar repositories for llm-hackers-handbook
Users that are interested in llm-hackers-handbook are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Can Large Language Models Solve Security Challenges? We test LLMs' ability to interact and break out of shell environments using the Over…☆13Aug 21, 2023Updated 2 years ago
- CVE-2021-21972 Unauthorized RCE in VMware vCenter metasploit exploit script☆20Mar 7, 2021Updated 5 years ago
- Just a bunch of useful scripts for netsec/admin/others☆16Dec 9, 2025Updated 3 months ago
- LLM Platform Security: Applying a Systematic Evaluation Framework to OpenAI's ChatGPT Plugins☆29Jul 29, 2024Updated last year
- A LLM explicitly designed for getting hacked☆167Aug 2, 2023Updated 2 years ago
- 🤫 husher - Encode text to be hidden from human eyes but visible to LLMs☆12Jan 18, 2024Updated 2 years ago
- Small tools to assist with using Large Language Models☆12Nov 7, 2023Updated 2 years ago
- Risks and targets for assessing LLMs & LLM vulnerabilities☆34May 27, 2024Updated last year
- Repository for PsychoEvals - a framework for LLM security, psychoanalysis, and moderation.☆18Apr 16, 2023Updated 2 years ago
- DLink DIR-846 Authenticated Remote Code Execution☆18Oct 4, 2023Updated 2 years ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆170Oct 13, 2023Updated 2 years ago
- ☆16Jan 5, 2017Updated 9 years ago
- LLM Oracle is a GPT-4 powered tool for predicting future events. It's like a Magic 8 Ball that is able to perform basic research, calcula…☆19May 27, 2023Updated 2 years ago
- a security scanner for custom LLM applications☆1,152Dec 1, 2025Updated 3 months ago
- SSE to Stdio MCP Proxy Server☆20Mar 9, 2026Updated 2 weeks ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 5 months ago
- Prompt Injections Everywhere☆195Aug 2, 2024Updated last year
- Provides a chat-based, LLM-assisted reverse engineering experience within Ghidra☆35Updated this week
- a python tool used to scan for Open redirection vulnerability☆20Dec 29, 2017Updated 8 years ago
- All xxx-arsenal repos in one☆17Jan 28, 2019Updated 7 years ago
- World's first Artificial Intelligence (XSS) Cross Site Scripting powered by Machine Learning with extreme fine-tuning designed to detect …☆33Jul 27, 2024Updated last year
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆16Jan 9, 2022Updated 4 years ago
- wifiDOS with scapy☆16May 4, 2016Updated 9 years ago
- The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for…☆19Jan 19, 2018Updated 8 years ago
- Strumenti per Domini - Whois - IP - Data Breach - Email☆18Oct 30, 2024Updated last year
- Writeups for Vulnhub, Tryhackme and Others☆13Jun 25, 2023Updated 2 years ago
- SSH Bruteforce Basic Script created with C++ to Linux☆10Jan 28, 2023Updated 3 years ago
- my own 2fa bypass methodolgy☆27Sep 22, 2023Updated 2 years ago
- ☆16Sep 19, 2025Updated 6 months ago
- Advanced APK analysis tool with intelligent caching, pattern matching, and comprehensive security vulnerability detection☆83Oct 21, 2025Updated 5 months ago
- A collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bul…☆99Jul 10, 2021Updated 4 years ago
- Powershell Script to enumerate AzureAD and output good data☆14Nov 8, 2023Updated 2 years ago
- raTrix is a powerful Android administration tool designed for Linux systems. It utilizes Python on the client-side and Java on the server…☆21Dec 28, 2024Updated last year
- New ways of breaking app-integrated LLMs☆2,066Jul 17, 2025Updated 8 months ago
- A collection of prompt injection mitigation techniques.☆28Aug 19, 2023Updated 2 years ago
- Securing LLM's Against Top 10 OWASP Large Language Model Vulnerabilities 2024☆22May 10, 2024Updated last year
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Apr 30, 2021Updated 4 years ago
- ☆13Feb 17, 2024Updated 2 years ago
- CyberShield 2025 Intro to EDR Evasion Class☆16Jun 3, 2025Updated 9 months ago