jiep / offensive-ai-compilationLinks
A curated list of useful resources that cover Offensive AI.
☆1,280Updated 2 weeks ago
Alternatives and similar repositories for offensive-ai-compilation
Users that are interested in offensive-ai-compilation are comparing it to the libraries listed below
Sorting:
- I leverage OpenAI and ChatGPT to do hackerish things☆1,112Updated 2 months ago
- Uses ChatGPT API, Bard API, and Llama2, Python-Nmap, DNS Recon, PCAP and JWT recon modules and uses the GPT3 model to create vulnerabilit…☆582Updated 10 months ago
- A curated list of large language model tools for cybersecurity research.☆474Updated last year
- A curated list of awesome security tools, experimental case or other interesting things with LLM or GPT.☆625Updated last month
- AI-powered penetration testing assistant for automating recon, note-taking, and vulnerability analysis.☆691Updated 4 months ago
- A Burp Suite extension that integrates OpenAI's GPT to perform an additional passive scan for discovering highly bespoke vulnerabilities …☆2,212Updated last year
- Prompt Injection Primer for Engineers☆460Updated 2 years ago
- A collection of bookmarks for penetration testers, bug bounty hunters, malware developers, reverse engineers and anyone who is just inte…☆917Updated 2 years ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,186Updated 3 months ago
- a security scanner for custom LLM applications☆965Updated this week
- A curated list of MLSecOps tools, articles and other resources on security applied to Machine Learning and MLOps systems.☆371Updated last month
- Collection of cheat sheets useful for pentesting☆491Updated last year
- Offensive security drives defensive security. We're sharing a collection of SaaS attack techniques to help defenders understand the threa…☆1,379Updated 2 months ago
- An AI-powered Personal Identifiable Information (PII) scanner.☆694Updated 8 months ago
- Node graphs, OSINT data mining, and plugins. Connect unstructured and public data for transformative insights. The rewrite can be found …☆805Updated 5 months ago
- A collection of awesome resources related AI security☆311Updated this week
- Learn AI security through a series of vulnerable LLM CTF challenges. No sign ups, no cloud fees, run everything locally on your system.☆299Updated last year
- some prompt about cyber security☆247Updated 2 years ago
- Conference presentation slides☆2,261Updated 3 weeks ago
- The useful exploit finder☆813Updated last year
- Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attrib…☆913Updated last year
- Twitter vulnerable snippets☆1,068Updated 6 months ago
- New ways of breaking app-integrated LLMs☆1,992Updated 2 months ago
- A list of online news & info sources in the InfoSec/Cybersecurity space☆364Updated last month
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆688Updated 5 months ago
- This is a repository of resource about Malware techniques☆810Updated 2 years ago
- 🐙 Track down GitHub users.☆945Updated 2 weeks ago
- Open source platform for cyber security analysts with many features for threat intelligence and detection engineering.☆717Updated last month
- The goal of this guide is very simple - to teach anyone interested in cyber security, regardless of their knowledge level, how to make th…☆788Updated 2 months ago
- Helping Ethical Hackers use LLMs in 50 Lines of Code or less..☆810Updated 2 weeks ago