joey-melo / payloadsLinks
Payloads for AI Red Teaming and beyond
☆286Updated last month
Alternatives and similar repositories for payloads
Users that are interested in payloads are comparing it to the libraries listed below
Sorting:
- The Arcanum Prompt Injection Taxonomy☆270Updated last month
- A research project to add some brrrrrr to Burp☆191Updated 7 months ago
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆250Updated 2 weeks ago
- ☆190Updated 5 months ago
- BloodHound-MCP-AI is integration that connects BloodHound with AI through Model Context Protocol, allowing security professionals to anal…☆289Updated 4 months ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆264Updated 4 months ago
- Verizon Burp Extensions: AI Suite☆138Updated 5 months ago
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆223Updated 10 months ago
- A Go-based utility that processes input through multiple AI models concurrently (OpenAI, Claude, and Gemini) and provides a summarized co…☆86Updated 3 months ago
- Security automation with n8n ideas: 100+ Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.☆149Updated 2 weeks ago
- Find CVEs associated to Linux and public exploits on github☆119Updated 5 months ago
- ☆330Updated 3 months ago
- FrogPost: postMessage Security Testing Tool☆96Updated last week
- AI for Ethical Hacking - Workshop☆219Updated last month
- Dredging up secrets from the depths of the file system☆131Updated 11 months ago
- A collection of Turbo Intruder scripts.☆65Updated 8 months ago
- A tool to keep AWS pentests and red teams efficient, organized, and stealthy.☆96Updated last year
- A LLM explicitly designed for getting hacked☆162Updated 2 years ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆165Updated last year
- Offensive Kubernetes Threat Matrix -- kubenomicon.com☆42Updated last month
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆226Updated 2 weeks ago
- Abuse trust-boundaries to bypass firewalls and network controls☆375Updated 2 months ago
- ☆240Updated 8 months ago
- Cloud subdomains identification tool☆60Updated 5 months ago
- LLMBUS AI red team tool 🚍☆73Updated last month
- Scripts to download every Wordpress plugin (updated in the last 2 years) and run Semgrep over the lot of it while storing output in a dat…☆80Updated 7 months ago
- OWASP Foundation web repository☆406Updated this week
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆212Updated 6 months ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆85Updated 5 months ago
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆219Updated last year