joey-melo / payloadsLinks
Payloads for AI Red Teaming and beyond
☆302Updated 2 months ago
Alternatives and similar repositories for payloads
Users that are interested in payloads are comparing it to the libraries listed below
Sorting:
- The Arcanum Prompt Injection Taxonomy☆310Updated 3 months ago
- ☆190Updated 6 months ago
- A research project to add some brrrrrr to Burp☆194Updated 9 months ago
- BloodHound-MCP-AI is integration that connects BloodHound with AI through Model Context Protocol, allowing security professionals to anal…☆306Updated 5 months ago
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆232Updated 11 months ago
- Verizon Burp Extensions: AI Suite☆141Updated 6 months ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆269Updated 6 months ago
- AI for Ethical Hacking - Workshop☆233Updated last month
- An archive of 0day.today exploits☆306Updated 3 months ago
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆257Updated 2 months ago
- Security automation with n8n ideas: 100+ Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.☆196Updated last month
- Find CVEs associated to Linux and public exploits on github☆119Updated 7 months ago
- A curated list of cloud pentesting resource, contains AWS, Azure, Google Cloud☆135Updated 3 years ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆87Updated 6 months ago
- This Repo serves as a collection of shared security and penetration testing resources for the cloud.☆284Updated last year
- Offensive Kubernetes Threat Matrix -- kubenomicon.com☆43Updated 3 months ago
- ☆340Updated 4 months ago
- A LLM explicitly designed for getting hacked☆163Updated 2 years ago
- A collection of Turbo Intruder scripts.☆66Updated 9 months ago
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆277Updated 3 weeks ago
- ☆243Updated 9 months ago
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆254Updated 3 years ago
- Cloud subdomains identification tool☆61Updated 7 months ago
- Halberd : Multi-Cloud Agentic Attack Tool☆321Updated last week
- OWASP Foundation web repository☆433Updated this week
- Simple web app to track OWASP WSTG security testing progress☆22Updated 2 months ago
- A tool to keep AWS pentests and red teams efficient, organized, and stealthy.☆96Updated last year
- Dredging up secrets from the depths of the file system☆130Updated last year
- A Go-based utility that processes input through multiple AI models concurrently (OpenAI, Claude, and Gemini) and provides a summarized co…☆87Updated 4 months ago
- Abuse trust-boundaries to bypass firewalls and network controls☆382Updated 3 months ago