jiep / offensive-ai-compilation
A curated list of useful resources that cover Offensive AI.
☆1,090Updated last week
Related projects: ⓘ
- I leverage OpenAI and ChatGPT to do hackerish things☆787Updated 5 months ago
- ☆761Updated this week
- A Burp Suite extension that integrates OpenAI's GPT to perform an additional passive scan for discovering highly bespoke vulnerabilities …☆1,973Updated 3 months ago
- Conference presentation slides☆1,442Updated last month
- Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attrib…☆717Updated 9 months ago
- A curated list of awesome security tools, experimental case or other interesting things with LLM or GPT.☆538Updated 2 months ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆906Updated last month
- Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!☆1,359Updated last week
- 🕵️ OSINT Tools for gathering information and actions forensics 🕵️☆1,663Updated 5 months ago
- OSINT from your favorite services in a friendly terminal user interface - integrations for Virustotal, Shodan, and Censys☆977Updated last month
- Tools and Techniques for Blue Team / Incident Response☆2,664Updated 5 months ago
- ☆1,263Updated 2 years ago
- ☆831Updated this week
- OSCP Cheatsheet by Sai Sathvik☆907Updated 3 weeks ago
- OffSec OSINT Pentest/RedTeam Tools☆761Updated 3 weeks ago
- Orange Cyberdefense mindmaps☆1,007Updated last year
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,721Updated 3 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆2,296Updated 9 months ago
- A collection of sources of documentation, as well as field best practices, to build/run a SOC☆1,169Updated this week
- ChatGPT Prompts for Bug Bounty & Pentesting☆529Updated 11 months ago
- Offensive security drives defensive security. We're sharing a collection of SaaS attack techniques to help defenders understand the threa…☆1,144Updated this week
- ☆1,107Updated last year
- Azure and AWS Attacks☆1,044Updated last year
- List of API's for gathering information about phone numbers, addresses, domains etc☆1,488Updated last month
- A full stack web application that combines many tools and services for security analysts into a single tool.☆493Updated last month
- A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assignments.☆716Updated 3 years ago
- ☆628Updated last year
- Node graphs, OSINT data mining, and plugins. Connect unstructured and public data for transformative insights☆679Updated 4 months ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆4,285Updated this week
- A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.☆2,239Updated this week