joey-melo / payloadsLinks
Payloads for AI Red Teaming and beyond
☆311Updated 4 months ago
Alternatives and similar repositories for payloads
Users that are interested in payloads are comparing it to the libraries listed below
Sorting:
- The Arcanum Prompt Injection Taxonomy☆375Updated 2 weeks ago
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆260Updated 3 months ago
- BloodHound-MCP-AI is integration that connects BloodHound with AI through Model Context Protocol, allowing security professionals to anal…☆321Updated 6 months ago
- ☆192Updated 8 months ago
- A research project to add some brrrrrr to Burp☆196Updated 10 months ago
- ☆123Updated last week
- ☆215Updated this week
- Verizon Burp Extensions: AI Suite☆141Updated 8 months ago
- Hands-on MCP security lab: 10 real incidents reproduced with vulnerable/secure MCP servers, pytest regressions, and Claude/Cursor battle-…☆61Updated 3 weeks ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆274Updated 7 months ago
- AI for Ethical Hacking - Workshop☆240Updated last month
- An archive of 0day.today exploits☆321Updated 5 months ago
- ☆348Updated 6 months ago
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆236Updated last year
- Halberd : Multi-Cloud Agentic Attack Tool☆327Updated this week
- Security automation with n8n ideas: 100+ Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.☆225Updated 3 months ago
- A security system to protect your vibecoded apps☆225Updated last week
- A LLM explicitly designed for getting hacked☆165Updated 2 years ago
- AI / LLM Red Team Field Manual & Consultant’s Handbook☆216Updated this week
- A visual methodology tracking platform tailored for offensive security assessments☆235Updated 2 months ago
- Find CVEs associated to Linux and public exploits on github☆119Updated 8 months ago
- A Go-based utility that processes input through multiple AI models concurrently (OpenAI, Claude, and Gemini) and provides a summarized co…☆88Updated 6 months ago
- OWASP Foundation web repository☆42Updated last week
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆255Updated 3 years ago
- Learn AI security through a series of vulnerable LLM CTF challenges. No sign ups, no cloud fees, run everything locally on your system.☆311Updated last year
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆221Updated last year
- This Repo serves as a collection of shared security and penetration testing resources for the cloud.☆290Updated last year
- Cloud subdomains identification tool☆62Updated 8 months ago
- ☆243Updated 11 months ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆86Updated 3 weeks ago