LLM-Powered Code Security Scanning
☆20Apr 2, 2025Updated 11 months ago
Alternatives and similar repositories for llm-security-scanner
Users that are interested in llm-security-scanner are comparing it to the libraries listed below
Sorting:
- Configuration Management (CM) Security Playground. A small enterprise security lab to practice automation + CM tooling like Ansible, Che…☆20Jul 21, 2025Updated 7 months ago
- An example of a mis-configured Rails application release under MIT license.☆21Jan 19, 2023Updated 3 years ago
- Whois for the Cloud: Recon tool for cloud provider attribution. Supports AWS, Azure, Google, Cloudflare, and Digital Ocean.☆183Oct 9, 2025Updated 4 months ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Jan 16, 2018Updated 8 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆78Jan 30, 2024Updated 2 years ago
- A module for CME that spiders across a domain.☆35Jul 15, 2022Updated 3 years ago
- 宽字节安全团队的博客☆31Mar 29, 2021Updated 4 years ago
- Updates to make TechNet PowerShell Windows Forms examples compatible with PowerShell 3.0 and later☆35Jul 24, 2014Updated 11 years ago
- Resources from Jamal & Giuliana's presentation on reserving bytecode into bounties for Jira and Confluence Plugins [BSides Canberra and K…☆22Nov 7, 2025Updated 4 months ago
- ☆10Nov 14, 2022Updated 3 years ago
- ☆34Apr 29, 2021Updated 4 years ago
- SYSTEM PROMPT TRANSPARENCY FOR ALL☆12May 22, 2025Updated 9 months ago
- Automate ISSG Tool Setups☆13Nov 21, 2024Updated last year
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- Most Popular Attack and Defend Competitive A/D mode for 5 years!☆12Feb 5, 2018Updated 8 years ago
- Visualization of an octree used to partition 3D point data☆11May 24, 2018Updated 7 years ago
- A repository for managing the complete lifecycle of large language model (LLM) development. This toolkit integrates open-source framework…☆12Jan 8, 2025Updated last year
- Fluxion is a easy to use wifi cracker, to test your own network☆11Feb 8, 2017Updated 9 years ago
- Show Window proxy settings☆16Oct 19, 2016Updated 9 years ago
- Cash is a Unix shell that is embedded within Objective Caml. It's a Caml implementation of (an as large as possible subset of) the API of…☆11Sep 7, 2013Updated 12 years ago
- Proof of concept implementation of a cyber threat intelligence and incident handling platform☆11Feb 10, 2023Updated 3 years ago
- Enhanced version of finddupe, a duplicate file detector for Windows☆11Dec 31, 2025Updated 2 months ago
- 批量域名筛查CDN☆12Nov 26, 2021Updated 4 years ago
- JS library to compute isomorphisms between two graphs☆10Apr 9, 2016Updated 9 years ago
- The NSE Script plugin integrates with Criminal IP CTI search engine for network scanning, showing IP details like WHOIS, running products…☆15Nov 29, 2023Updated 2 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- ☆13Nov 28, 2025Updated 3 months ago
- Automated Real-Time Threat Hunting with ATD, Active Response and Elasticsearch/Kibana☆10Aug 17, 2018Updated 7 years ago
- WinDbg cheat sheet☆16May 10, 2023Updated 2 years ago
- ☆10Nov 21, 2023Updated 2 years ago
- java 内存马系列 实现(Servlets 、组件、Agent)☆10Mar 7, 2022Updated 3 years ago
- A coverage library for Chisel designs☆11Mar 12, 2020Updated 5 years ago
- Disk Image Mounting Script☆11Jan 22, 2026Updated last month
- Java ☕ reverse engineering tool - Batch decompile the jar package.☆10Feb 14, 2023Updated 3 years ago
- Osquery Packs we use for customer security hardening☆12Jun 30, 2025Updated 8 months ago
- Mimikatz embedded as classes☆28Oct 25, 2021Updated 4 years ago
- .Net Core library for cryptocurrency trading with support for many exchanges on the Bitcoin and Ethereum blockchains☆11Aug 27, 2025Updated 6 months ago
- 灯塔v2.6.2_docker版本☆15Oct 13, 2025Updated 4 months ago
- A sub-domain reconnaissance written in golang☆12Jan 11, 2018Updated 8 years ago