joey-melo / payloadsLinks
Payloads for AI Red Teaming and beyond
☆253Updated last month
Alternatives and similar repositories for payloads
Users that are interested in payloads are comparing it to the libraries listed below
Sorting:
- The Arcanum Prompt Injection Taxonomy☆209Updated 2 weeks ago
- A research project to add some brrrrrr to Burp☆185Updated 6 months ago
- ☆189Updated 4 months ago
- BloodHound-MCP-AI is integration that connects BloodHound with AI through Model Context Protocol, allowing security professionals to anal…☆266Updated 2 months ago
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆247Updated 4 months ago
- Verizon Burp Extensions: AI Suite☆137Updated 4 months ago
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆225Updated 8 months ago
- AI for Ethical Hacking - Workshop☆159Updated last week
- A LLM explicitly designed for getting hacked☆158Updated 2 years ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆258Updated 3 months ago
- ☆316Updated 2 months ago
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆123Updated this week
- Find CVEs associated to Linux and public exploits on github☆119Updated 4 months ago
- Cloud subdomains identification tool☆61Updated 4 months ago
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆321Updated this week
- A Go-based utility that processes input through multiple AI models concurrently (OpenAI, Claude, and Gemini) and provides a summarized co…☆82Updated 2 months ago
- LLMBUS AI red team tool 🚍☆64Updated last week
- A collection of Turbo Intruder scripts.☆63Updated 6 months ago
- A visual methodology tracking platform tailored for offensive security assessments☆196Updated 2 weeks ago
- ☆241Updated 7 months ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆164Updated last year
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆85Updated 4 months ago
- Abuse trust-boundaries to bypass firewalls and network controls☆369Updated last month
- ☆22Updated 4 months ago
- Dredging up secrets from the depths of the file system☆131Updated 9 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆208Updated 4 months ago
- BaldHead is a modular and interactive Active Directory (AD) attack framework built for red teamers and security testers. It automates enu…☆104Updated 2 months ago
- Learn AI security through a series of vulnerable LLM CTF challenges. No sign ups, no cloud fees, run everything locally on your system.☆297Updated last year
- Azure mindmap for penetration tests☆187Updated last year
- Offensive Kubernetes Threat Matrix -- kubenomicon.com☆41Updated 2 weeks ago