jaredfolkins / llmonLinks
LLMON 🍋 - The World's First Web Adversarial AI Firewall
☆24Updated last week
Alternatives and similar repositories for llmon
Users that are interested in llmon are comparing it to the libraries listed below
Sorting:
- Ebyte-Go-Morpher is a Go program that parses, analyzes, and rewrites Go source code to apply multiple layers of obfuscation. It operates …☆120Updated 5 months ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆43Updated 8 months ago
- This repository consists of extensions, that hacktron uses to execute specific workflows in CLI.☆59Updated this week
- NeuroSploitv2 is an advanced, AI-powered penetration testing framework designed to automate and augment various aspects of offensive secu…☆211Updated last week
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆86Updated 9 months ago
- Identify Azure AD resources that issue tokens without MFA enforcement using the ROPC grant flow.☆82Updated last month
- A Qemu Proxmox Template builder project using Packer☆67Updated 3 weeks ago
- Ludus FastMCP enables AI-powered management of Ludus cyber ranges through natural language commands. The server exposes **157 tools** acr…☆58Updated last week
- Guardian is a production-ready AI-powered penetration testing automation CLI tool that leverages Google Gemini and LangChain to orchestra…☆207Updated last week
- CF GeoBypasser Cyberpunk Framework is a Modular Offensive Toolkit designed to discover and bypass Cloudflare-based Geo-restrictions using…☆44Updated 3 weeks ago
- ☆95Updated 4 months ago
- AI-powered subdomain enumeration tool with local LLM analysis via Ollama - 100% private, zero API costs☆182Updated last month
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆426Updated 2 months ago
- A no-reboot, in-memory Linux persistence PoC leveraging namespace joining, user-namespace elevation, and self‑deletion.☆67Updated 4 months ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆59Updated 5 months ago
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.☆157Updated last month
- ☆55Updated last month
- GCP-Hound - Google Cloud Security Attack Path Discovery Tool - v1.1.1☆67Updated 2 months ago
- AI / LLM Red Team Field Manual & Consultant’s Handbook☆216Updated last week
- IP Rotation from different providers - Like FireProx but for GCP, Azure, Alibaba and CloudFlare☆249Updated 2 weeks ago
- Exploits Unauth Docker API☆43Updated 8 months ago
- Speedy probe-based UDP service scanner☆116Updated 2 months ago
- PyCript Websocket is now merge into https://github.com/Anof-cyber/PyCript, this repo is not available anymore.☆83Updated this week
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆47Updated 4 months ago
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆39Updated 9 months ago
- A tool to interact with Windows drivers to perform a raw disk read and parse out target files without calling standard Windows file APIs☆101Updated 3 months ago
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆165Updated 5 months ago
- ☆186Updated last month
- Palo Alto Networks AI Runtime Security Model Context Protocol (MCP) Relay Server☆30Updated 2 months ago
- ☆52Updated 3 weeks ago