ibndias / CIPHERLinks
Cybersecurity Intelligent Pentesting Helper for Ethical Researcher (CIPHER). Fine tuned LLM for penetration testing guidance based on writeups.
☆24Updated 6 months ago
Alternatives and similar repositories for CIPHER
Users that are interested in CIPHER are comparing it to the libraries listed below
Sorting:
- https://arxiv.org/abs/2412.02776☆57Updated 6 months ago
- ☆79Updated last month
- ☆63Updated 4 months ago
- ☆37Updated this week
- using ML models for red teaming☆43Updated last year
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆120Updated 6 months ago
- ☆14Updated 6 months ago
- 🤖🛡️🔍🔒🔑 Tiny package designed to support red teams and penetration testers in exploiting large language model AI solutions.☆23Updated last year
- This is a dataset intended to train a LLM model for a completely CVE focused input and output.☆60Updated 7 months ago
- Penetration Testing AI Assistant based on open source LLMs.☆84Updated 2 months ago
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆27Updated 5 months ago
- A LLM explicitly designed for getting hacked☆152Updated last year
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆163Updated last year
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated 10 months ago
- A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.☆35Updated last year
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆31Updated this week
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆126Updated last year
- An example vulnerable app that integrates an LLM☆21Updated last year
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆89Updated last month
- ☆17Updated 2 months ago
- Automated vulnerability discovery and annotation☆67Updated 10 months ago
- ☆47Updated last month
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆40Updated 2 months ago
- A very simple open source implementation of Google's Project Naptime☆155Updated 2 months ago
- Payloads for Attacking Large Language Models☆90Updated 3 weeks ago
- Prompt Injections Everywhere☆128Updated 10 months ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆53Updated 3 months ago
- NOT for educational purposes: An MCP server for professional penetration testers including STDIO/HTTP/SSE support, nmap, go/dirbuster, ni…☆47Updated 2 weeks ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆109Updated last year
- ☆246Updated last week