jc-ryan / holistic_automated_red_teamingView external linksLinks
[EMNLP 2024] Holistic Automated Red Teaming for Large Language Models through Top-Down Test Case Generation and Multi-turn Interaction
☆17Nov 9, 2024Updated last year
Alternatives and similar repositories for holistic_automated_red_teaming
Users that are interested in holistic_automated_red_teaming are comparing it to the libraries listed below
Sorting:
- A red teaming attack paradigm against AI Agents☆32Mar 9, 2025Updated 11 months ago
- A Rust template for writing Beacon Object Files (BOFs)☆87Updated this week
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Jul 9, 2023Updated 2 years ago
- A powerful Windows UI monitoring and DNS exfiltration tool written in Rust, combining advanced UI event capture capabilities with secure …☆19Mar 6, 2025Updated 11 months ago
- 🛡️ Open-source binary protection toolkit for Windows PE. Nanomite, VM protection, anti-debug, and more.☆49Feb 8, 2026Updated last week
- Windows Active DIrectory Pentesting documentation.☆19Jun 14, 2024Updated last year
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆45Feb 6, 2026Updated last week
- AI-based implant feature☆25Apr 28, 2025Updated 9 months ago
- Structured CSVs and table schemas extracted from the 29-April-2025 LockBit affiliate-panel database leak.☆28May 8, 2025Updated 9 months ago
- Dll injection through code page id modification in registry. Based on jonas lykk research☆17Jun 18, 2022Updated 3 years ago
- SOAPI - The OpenAPI Documentation Scanner☆39Feb 17, 2025Updated 11 months ago
- source code for the offsecml framework☆44Jun 6, 2024Updated last year
- ☆26Mar 6, 2025Updated 11 months ago
- Library of BOFs to interact with SQL servers☆23Apr 9, 2025Updated 10 months ago
- open source port/reimplementation of the Cobalt Strike BOF Loader as is☆64Feb 3, 2026Updated last week
- Mockingjay Process Injection Vulnerable DLL Finder☆19Jun 30, 2023Updated 2 years ago
- OSED Practice binary☆25Nov 23, 2023Updated 2 years ago
- Decrypt Chromium based browser passwords with PowerShell.☆133Nov 14, 2025Updated 3 months ago
- A 64 bit executable junk code engine for polymorphic malware.☆75Jun 16, 2025Updated 7 months ago
- Cortex EDR Ransomware protection Bypass☆26Feb 8, 2025Updated last year
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆26Aug 18, 2024Updated last year
- AI-Powered, Local Pythonic Coding Agent 🐞💻☆24Mar 3, 2025Updated 11 months ago
- A simple POC to expose Mythic as a MCP server☆73Mar 20, 2025Updated 10 months ago
- Proxy function calls through the thread pool with ease☆31Feb 27, 2025Updated 11 months ago
- vulnlab.com reaper writeup☆27Aug 30, 2023Updated 2 years ago
- Early Bird Cryo Injections – APC-based DLL & Shellcode Injection via Pre-Frozen Job Objects☆135Apr 6, 2025Updated 10 months ago
- Automates the network enumeration process in a fire-and-forget manner, among many more powerful functions. Zero effort, zero error networ…☆67Jan 11, 2026Updated last month
- pugrecon is a bash script for automatic recon of common vulnerabilities, misconfigurations and files on domains.☆25Mar 18, 2021Updated 4 years ago
- ☆48Dec 21, 2025Updated last month
- Proof-of-concept implementation of AI-enabled postex DLLs☆54Sep 10, 2025Updated 5 months ago
- An In-memory Embedding of CPython☆31May 24, 2021Updated 4 years ago
- A PoC for Early Cascade process injection technique.☆208Jan 30, 2025Updated last year
- ☆33Mar 19, 2025Updated 10 months ago
- ☆58Jul 31, 2025Updated 6 months ago
- A command line tool for extracting machine learning ready data from software binaries powered by Radare2