jiep / offensive-ai-compilationLinks
A curated list of useful resources that cover Offensive AI.
☆1,262Updated this week
Alternatives and similar repositories for offensive-ai-compilation
Users that are interested in offensive-ai-compilation are comparing it to the libraries listed below
Sorting:
- I leverage OpenAI and ChatGPT to do hackerish things☆1,060Updated 2 weeks ago
- A curated list of awesome security tools, experimental case or other interesting things with LLM or GPT.☆615Updated 2 months ago
- A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.☆2,700Updated last week
- Prompt Injection Primer for Engineers☆449Updated last year
- Offensive security drives defensive security. We're sharing a collection of SaaS attack techniques to help defenders understand the threa…☆1,359Updated last month
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,169Updated 2 months ago
- A collection of bookmarks for penetration testers, bug bounty hunters, malware developers, reverse engineers and anyone who is just inte…☆918Updated last year
- A Burp Suite extension that integrates OpenAI's GPT to perform an additional passive scan for discovering highly bespoke vulnerabilities …☆2,167Updated last year
- A curated list of large language model tools for cybersecurity research.☆468Updated last year
- Collection of cheat sheets useful for pentesting☆470Updated last year
- AI-powered penetration testing assistant for automating recon, note-taking, and vulnerability analysis.☆662Updated 3 months ago
- Uses ChatGPT API, Bard API, and Llama2, Python-Nmap, DNS Recon, PCAP and JWT recon modules and uses the GPT3 model to create vulnerabilit…☆564Updated 9 months ago
- A curated list of MLSecOps tools, articles and other resources on security applied to Machine Learning and MLOps systems.☆347Updated last week
- Conference presentation slides☆1,757Updated 2 months ago
- Resources for Application Security including Web, API, Android, iOS and Thick Client☆681Updated 2 years ago
- Periodic cyber security newsletters that capture the latest news, summaries of conference talks, research, best practices, tools, events,…☆1,130Updated 3 weeks ago
- Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attrib…☆894Updated last year
- Node graphs, OSINT data mining, and plugins. Connect unstructured and public data for transformative insights. The rewrite can be found …☆807Updated 3 months ago
- Tools and Techniques for Blue Team / Incident Response☆3,244Updated 4 months ago
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,153Updated 3 months ago
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,066Updated this week
- A resource containing all the tools each ransomware gangs uses☆1,101Updated last month
- Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.☆1,707Updated 2 months ago
- This is a repository of resource about Malware techniques☆802Updated 2 years ago
- OSCP 2023 Preparation Guide | Courses, Tricks, Tutorials, Exercises, Machines☆1,035Updated 9 months ago
- OSCP Cheatsheet by Sai Sathvik☆1,078Updated 10 months ago
- a security scanner for custom LLM applications☆890Updated last week
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,914Updated last year
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,802Updated last year
- Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!☆1,762Updated this week