☆11Nov 7, 2025Updated 3 months ago
Alternatives and similar repositories for ape-taxonomy
Users that are interested in ape-taxonomy are comparing it to the libraries listed below
Sorting:
- CloudPathSniffer is an open-source, easy to use and extensible Cloud Anomaly Detection platform designed to help security teams to find h…☆13Nov 30, 2023Updated 2 years ago
- A library for structural-semantic chunking of documents.☆12Oct 8, 2025Updated 4 months ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- A research workbench for developing and testing attacks against large language models, with a focus on prompt injection vulnerabilities a…☆39Updated this week
- ☆14Mar 9, 2025Updated 11 months ago
- ☆10Sep 18, 2025Updated 5 months ago
- A MCP for Claude Desktop to build n8n workflows for you☆19Oct 25, 2025Updated 4 months ago
- A CLI tool (and library) written in Go to simplify the process of retrieving IP addresses from infrastructure hosted on Google Cloud Plat…☆11Nov 20, 2025Updated 3 months ago
- ApsaraStack Terraform Provider☆10Aug 28, 2025Updated 6 months ago
- ☆14Mar 10, 2025Updated 11 months ago
- IRC-like chat program using POSIX advisory lock covert-channel on time namespaces☆23Nov 12, 2025Updated 3 months ago
- Transforming NotebookLM into a versatile bot☆19Feb 22, 2026Updated last week
- PeTAL: Ensuring Access Control Integrity against Data-only Attacks on Linux (ACM CCS 2024)☆16Nov 4, 2024Updated last year
- ☆16Oct 18, 2024Updated last year
- 云原生安全漏洞收集☆18Jul 9, 2025Updated 7 months ago
- php decrypt environment for study☆17Jan 10, 2024Updated 2 years ago
- Industrial Cybersecurity Conference Index☆13Mar 11, 2024Updated last year
- Official Lacework Helm Charts☆12Feb 20, 2026Updated last week
- 内存分析中玩贪吃蛇☆16Jan 13, 2024Updated 2 years ago
- Visual Studio Code GDB Debug Adapter for C and C++ programs.☆14Aug 4, 2023Updated 2 years ago
- An open-source automated peptide synthesizer based on Arduino and Python☆13Dec 19, 2025Updated 2 months ago
- [VLM-Attack-Survey-2024] Paper list and projects for VLM attacks☆15Feb 12, 2025Updated last year
- ☆15Aug 20, 2025Updated 6 months ago
- Database schema management in a serverless way☆12Jun 12, 2024Updated last year
- Mirror site speedtest☆12Dec 4, 2023Updated 2 years ago
- A guide to simplify the process of evaluating Datadog's Cloud SIEM security capabilities to detect AWS threats.☆19Jul 24, 2023Updated 2 years ago
- WALA 学习笔记☆14Aug 8, 2023Updated 2 years ago
- ☆27Oct 15, 2025Updated 4 months ago
- Artifacts for the WOOT publication.☆18Oct 3, 2020Updated 5 years ago
- Fetches transcripts from YouTube videos, including private ones with granted access, and optionally downloads the videos. Does not suppor…☆16Apr 17, 2024Updated last year
- Python+Flask Information Security Rss☆15Nov 6, 2023Updated 2 years ago
- PFI: Prompt Flow Integrity to Prevent Privilege Escalation in LLM Agents☆26Mar 26, 2025Updated 11 months ago
- A tool for adding new lines to files, skipping duplicates and written in Rust!☆19May 8, 2025Updated 9 months ago
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sys…☆18Jan 26, 2026Updated last month
- JsHookScript, All the hook scripts I know☆18Jun 16, 2024Updated last year
- Create Rules for Cursor AI from any code☆27Apr 13, 2025Updated 10 months ago
- Starter kit: Re-implementation of the AWS Amplify CLI in CDK☆17May 14, 2022Updated 3 years ago
- Expand upon the youtube-transcript-api and allow users to easily request all of a channel's (and maybe a playlist's) video captions. Will…☆18Dec 8, 2022Updated 3 years ago
- Soot-based taint analysis with internal Java fluent interface for security specifications in fluentTQL implemented with MagpieBridge to s…☆18Jan 30, 2025Updated last year