jiep / offensive-ai-compilation
A curated list of useful resources that cover Offensive AI.
☆1,205Updated last week
Alternatives and similar repositories for offensive-ai-compilation:
Users that are interested in offensive-ai-compilation are comparing it to the libraries listed below
- I leverage OpenAI and ChatGPT to do hackerish things☆880Updated 6 months ago
- Prompt Injection Primer for Engineers☆430Updated last year
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,121Updated last week
- A curated list of awesome security tools, experimental case or other interesting things with LLM or GPT.☆589Updated 3 months ago
- Offensive security drives defensive security. We're sharing a collection of SaaS attack techniques to help defenders understand the threa…☆1,312Updated 2 months ago
- AI-powered penetration testing assistant for automating recon, note-taking, and vulnerability analysis.☆588Updated this week
- A collection of sources of documentation, as well as field best practices, to build/run a SOC☆1,368Updated 2 months ago
- ChatGPT Prompts for Bug Bounty & Pentesting☆606Updated last year
- ☆804Updated last year
- This is a repository of resource about Malware techniques☆793Updated 2 years ago
- A collection of awesome resources related AI security☆206Updated this week
- Awesome EDR Bypass Resources For Ethical Hacking☆1,159Updated 2 months ago
- Network Security Sniffer☆783Updated this week
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,884Updated last year
- A Burp Suite extension that integrates OpenAI's GPT to perform an additional passive scan for discovering highly bespoke vulnerabilities …☆2,118Updated 10 months ago
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆656Updated this week
- Orange Cyberdefense mindmaps☆1,285Updated last month
- An offensive data enrichment pipeline☆671Updated last week
- A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assignments.☆842Updated 4 years ago
- Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attrib…☆863Updated last year
- Uses ChatGPT API, Bard API, and Llama2, Python-Nmap, DNS Recon, PCAP and JWT recon modules and uses the GPT3 model to create vulnerabilit…☆554Updated 5 months ago
- A curated list of large language model tools for cybersecurity research.☆449Updated last year
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,783Updated 11 months ago
- 🕵️ OSINT Tools for gathering information and actions forensics 🕵️☆1,927Updated last month
- A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.☆2,556Updated this week
- Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.☆1,373Updated last month
- ☆1,501Updated 2 years ago
- You didn't think I'd go and leave the blue team out, right?☆1,651Updated last year
- Sticky notes for pentesting, bug bounty, CTF.☆686Updated last week
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆1,955Updated last week