A LLM explicitly designed for getting hacked
☆166Aug 2, 2023Updated 2 years ago
Alternatives and similar repositories for DamnVulnerableLLMProject
Users that are interested in DamnVulnerableLLMProject are comparing it to the libraries listed below
Sorting:
- ☆375Jun 25, 2025Updated 8 months ago
- ☆11Aug 18, 2023Updated 2 years ago
- The aim of the project is to develop intentionally vulnerable source code in various languages.☆15May 3, 2020Updated 5 years ago
- Payloads for Attacking Large Language Models☆127Jan 13, 2026Updated last month
- ☆22Oct 21, 2024Updated last year
- Ultimate Wordlist for Web Content Discovery☆68Apr 28, 2025Updated 10 months ago
- Xss payload for bypassing waf☆18Apr 18, 2020Updated 5 years ago
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Dec 3, 2025Updated 3 months ago
- A list of notes that I've compiled over time to help with CTF's and the OSCP exam.☆10Dec 29, 2020Updated 5 years ago
- 🧠 LLMFuzzer - Fuzzing Framework for Large Language Models 🧠 LLMFuzzer is the first open-source fuzzing framework specifically designed …☆344Feb 12, 2024Updated 2 years ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆168Oct 13, 2023Updated 2 years ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆11Dec 29, 2021Updated 4 years ago
- This script reads a text file containing domains, fetches the subdomains from crt.sh☆11May 31, 2023Updated 2 years ago
- Describe how to use ffuf different options with examples☆13Jun 13, 2022Updated 3 years ago
- LobotoMl is a set of scripts and tools to assess production deployments of ML services☆10May 16, 2022Updated 3 years ago
- Automate Checkmarx Scanning and Onboarding Plus AWS Access☆12Jan 5, 2023Updated 3 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆25Jun 11, 2025Updated 8 months ago
- Are you able to use open source intelligence to solve this challenge?☆11Apr 14, 2019Updated 6 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- ☆25Dec 28, 2023Updated 2 years ago
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Apr 1, 2023Updated 2 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆11Oct 18, 2022Updated 3 years ago
- A simple Impacket-based tool to check a set of credentials against many Windows hosts and get permission for SMB shares.☆13Dec 26, 2025Updated 2 months ago
- Arxiv + Notion Sync☆20May 12, 2025Updated 9 months ago
- Unofficial Iranian hackers group disk wiper malware aka "Shamoon" in .NET 2.0☆13Dec 23, 2018Updated 7 years ago
- using ML models for red teaming☆42Aug 9, 2023Updated 2 years ago
- KERnano: The No-install Python Pen Testing kit. (Windows & Linux)☆13Sep 2, 2022Updated 3 years ago
- ☆10May 25, 2023Updated 2 years ago
- LLM Vulnerable Application☆13Aug 19, 2023Updated 2 years ago