jiep / offensive-ai-compilation
A curated list of useful resources that cover Offensive AI.
☆1,169Updated 2 weeks ago
Alternatives and similar repositories for offensive-ai-compilation:
Users that are interested in offensive-ai-compilation are comparing it to the libraries listed below
- Conference presentation slides☆1,682Updated this week
- A Burp Suite extension that integrates OpenAI's GPT to perform an additional passive scan for discovering highly bespoke vulnerabilities …☆2,051Updated 8 months ago
- A curated list of awesome security tools, experimental case or other interesting things with LLM or GPT.☆574Updated last month
- OffSec OSINT Pentest/RedTeam Tools☆909Updated 3 weeks ago
- 🕵️ OSINT Tools for gathering information and actions forensics 🕵️☆1,849Updated this week
- Tools and Techniques for Blue Team / Incident Response☆2,961Updated 10 months ago
- A collection of one-liners for bug bounty hunting.☆1,280Updated last month
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆645Updated 4 months ago
- OSCP Cheatsheet by Sai Sathvik☆1,001Updated 4 months ago
- a prompt injection scanner for custom LLM applications☆740Updated this week
- OSINT from your favorite services in a friendly terminal user interface - integrations for Virustotal, Shodan, and Censys☆1,008Updated 4 months ago
- This is a repository of resource about Malware techniques☆779Updated last year
- Twitter vulnerable snippets☆975Updated 2 months ago
- Network Pentesting Mindmap☆744Updated 5 months ago
- A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.☆2,448Updated this week
- A collection of bookmarks for penetration testers, bug bounty hunters, malware developers, reverse engineers and anyone who is just inte…☆900Updated last year
- I leverage OpenAI and ChatGPT to do hackerish things☆853Updated 3 months ago
- A collection of awesome resources related AI security☆174Updated 2 weeks ago
- Sticky notes for pentesting, bug bounty, CTF.☆655Updated 3 weeks ago
- ☆797Updated last year
- Resources for Application Security including Web, API, Android, iOS and Thick Client☆669Updated last year
- Collection of knowledge about information security☆589Updated 3 weeks ago
- ChatGPT Prompts for Bug Bounty & Pentesting☆591Updated last year
- Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!☆1,485Updated 2 weeks ago
- Awesome EDR Bypass Resources For Ethical Hacking☆1,093Updated 3 weeks ago
- Tools and Techniques for Red Team / Penetration Testing☆6,306Updated last year
- A workshop about Malware Development☆1,621Updated last year
- A collection of sources of documentation, as well as field best practices, to build/run a SOC☆1,326Updated this week
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,873Updated last year
- OSINT tools for Information gathering, Cybersecurity, Reverse searching, bugbounty, trust and safety, red team oprations and more.☆590Updated 2 weeks ago