ibndias / CIPHER
Cybersecurity Intelligent Pentesting Helper for Ethical Researcher (CIPHER). Fine tuned LLM for penetration testing guidance based on writeups.
☆17Updated 3 weeks ago
Alternatives and similar repositories for CIPHER:
Users that are interested in CIPHER are comparing it to the libraries listed below
- A LLM explicitly designed for getting hacked☆134Updated last year
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆154Updated last year
- ☆192Updated last year
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆75Updated last month
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆36Updated 4 months ago
- A fast and comprehensive tool for organizational network scanning☆127Updated 9 months ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆42Updated 4 months ago
- ☆33Updated last month
- Payloads for Attacking Large Language Models☆72Updated 6 months ago
- using ML models for red teaming☆39Updated last year
- Automated vulnerability discovery and annotation☆64Updated 5 months ago
- A multifaceted security tool which leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting and more.☆71Updated 2 weeks ago
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆78Updated 8 months ago
- Prompt Injections Everywhere☆100Updated 5 months ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆50Updated 10 months ago
- https://arxiv.org/abs/2412.02776☆41Updated last month
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆45Updated 2 months ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆98Updated 11 months ago
- Protection against HTML smuggling attempts.☆83Updated this week
- An example vulnerable app that integrates an LLM☆15Updated 9 months ago
- A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.☆32Updated last year
- All the principles of the AI modular structure that generates malicious code fragments sold on the dark web☆67Updated 8 months ago
- ReconPal: Leveraging NLP for Infosec☆55Updated 2 years ago
- LLM Testing Findings Templates☆66Updated 11 months ago
- some prompt about cyber security☆168Updated last year
- SourceGPT - prompt manager and source code analyzer built on top of ChatGPT as the oracle☆106Updated last year
- source code for the offsecml framework☆37Updated 7 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆106Updated 2 months ago
- Mapping of open-source detection rules and atomic tests.☆87Updated this week