gdalmau / lakera-gandalf-solutionsView external linksLinks
My inputs for the LLM Gandalf made by Lakera
☆49Sep 18, 2023Updated 2 years ago
Alternatives and similar repositories for lakera-gandalf-solutions
Users that are interested in lakera-gandalf-solutions are comparing it to the libraries listed below
Sorting:
- A Sigma based detection pipeline☆13Dec 15, 2023Updated 2 years ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆25May 29, 2023Updated 2 years ago
- Automated compromise detection of the world's most popular packages☆17Sep 25, 2023Updated 2 years ago
- Locate intersting files in grayhatwarfare.com open S3 buckets and Azure blobs automatically!☆29Apr 6, 2022Updated 3 years ago
- ☆21Jul 24, 2022Updated 3 years ago
- A boilerplate for developing, testing and deploying smart contracts using Hardhat and Ethers.js☆19Aug 31, 2022Updated 3 years ago
- ☆43Mar 13, 2023Updated 2 years ago
- Opensource repository for DVID V2☆16Jun 3, 2025Updated 8 months ago
- Decode obfuscated ldap_default_authtok from sssd.conf☆29Mar 7, 2019Updated 6 years ago
- Hacker Animation Cool Console Kryptographic Sequencer (haccks)☆15Oct 14, 2024Updated last year
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆30Oct 11, 2023Updated 2 years ago
- Kiwi PN532 SPI library for Arduino☆16Feb 2, 2026Updated 2 weeks ago
- A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup☆38Sep 14, 2023Updated 2 years ago
- HomePlugAV tools to test PLC (in)security☆47Dec 19, 2024Updated last year
- an Evil Java RMI Registry.☆51Feb 8, 2023Updated 3 years ago
- Write ups for Ph0wn CTF☆48Aug 12, 2025Updated 6 months ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆44Oct 29, 2024Updated last year
- ☆42Aug 12, 2022Updated 3 years ago
- Cisco Unfied Call Manager enumeration☆25Jul 13, 2022Updated 3 years ago
- Burp Extension to add additional functionality for pentesting websocket based applications☆103Aug 27, 2025Updated 5 months ago
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆56Apr 27, 2023Updated 2 years ago
- ☆23Feb 2, 2026Updated 2 weeks ago
- ☆24Jun 9, 2024Updated last year
- simple webapp for converting sigma rules into siem queries using the pySigma library☆52Sep 1, 2023Updated 2 years ago
- Webshell agent in aspx and php☆28Dec 11, 2025Updated 2 months ago
- Another tool for exploiting CVE-2017-9248, a cryptographic weakness in Telerik UI for ASP.NET AJAX dialog handler.☆60Aug 21, 2024Updated last year
- ☆65Jan 2, 2024Updated 2 years ago
- Tool for efficient directory enumeration☆65Jan 27, 2026Updated 3 weeks ago
- The OllaLab-Lean project is designed to help both novice and experienced developers rapidly set up and begin working on LLM-based project…☆29Jan 8, 2026Updated last month
- CVE-2018-6066 using VBA☆68Oct 24, 2022Updated 3 years ago
- CVSS (Common Vulnerability Scoring System) v3.1 Javascript calculator toolkit☆67Aug 23, 2024Updated last year
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆37Aug 8, 2025Updated 6 months ago
- UPX - the Ultimate Packer for eXecutables☆69Mar 9, 2022Updated 3 years ago
- A set of open-source community scripts☆65Oct 12, 2024Updated last year
- AAD related enumeration in Nim☆132Sep 7, 2023Updated 2 years ago
- ☆75Apr 8, 2024Updated last year
- Beacon compiled using clang☆73Jan 22, 2023Updated 3 years ago
- R Ultimate 2023 - R for Data Science and Machine Learning, by Packt Publishing☆15Dec 15, 2025Updated 2 months ago
- ☆30May 23, 2024Updated last year