jc-ryan / holistic_automated_red_teamingLinks
[EMNLP 2024] Holistic Automated Red Teaming for Large Language Models through Top-Down Test Case Generation and Multi-turn Interaction
☆17Updated last year
Alternatives and similar repositories for holistic_automated_red_teaming
Users that are interested in holistic_automated_red_teaming are comparing it to the libraries listed below
Sorting:
- ☆26Updated 9 months ago
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆40Updated last year
- A simple POC to expose Mythic as a MCP server☆72Updated 8 months ago
- Proxy function calls through the thread pool with ease☆31Updated 9 months ago
- AI-based implant feature☆25Updated 7 months ago
- use python on windows with full submodule support without installation☆30Updated 10 months ago
- This is the Git repository for the Modern Red Teaming workshop given at SINCON2024.☆12Updated last year
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆78Updated 3 months ago
- ☆12Updated 10 months ago
- BOF for C2 framework☆44Updated last year
- Examples of various container types for Python and Golang☆15Updated 3 months ago
- A Rust PoC implementation of the Early Bird process hollowing technique, inspired by https://github.com/boku7/HOLLOW.☆30Updated 10 months ago
- Simple reverse ICMP shell☆14Updated last year
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Updated 2 years ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆45Updated last year
- CVE-2025-59501 POC code☆22Updated 3 weeks ago
- ☆55Updated 5 months ago
- Cortex EDR Ransomware protection Bypass☆25Updated 10 months ago
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆49Updated 5 months ago
- Post-Ex BOF tooling for Hannibal☆24Updated last year
- A Payload Analysis Framework☆112Updated 2 months ago
- .NET tool used to enrich RPC telemetry☆101Updated 6 months ago
- Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability☆24Updated 10 months ago
- Dll injection through code page id modification in registry. Based on jonas lykk research☆17Updated 3 years ago
- Proof-of-concept implementation of AI-enabled postex DLLs☆51Updated 3 months ago
- Mythic C2 wrapper for NimSyscallPacker☆25Updated 9 months ago
- A lexer and parser for Sleep☆20Updated 7 months ago
- Enable or Disable TokenPrivilege(s)☆15Updated last year
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated last year
- A red teaming attack paradigm against AI Agents☆32Updated 9 months ago